Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-2513 | First vendor Publication | 2009-11-11 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Graphics Device Interface (GDI) in win32k.sys in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Insufficient Data Validation Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2513 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6277 | |||
Oval ID: | oval:org.mitre.oval:def:6277 | ||
Title: | Win32k Insufficient Data Validation Vulnerability | ||
Description: | The Graphics Device Interface (GDI) in win32k.sys in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Win32k Insufficient Data Validation Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-2513 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2009-11-12 | Microsoft Windows 2000-2008 Embedded OpenType Font Engine Remote Code Execution |
OpenVAS Exploits
Date | Description |
---|---|
2009-11-11 | Name : Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities (969947) File : nvt/secpod_ms09-065.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
59868 | Microsoft Windows Win32k GDI Kernel Component Unspecified Local Privilege Esc... |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows kernel-mode drivers core font parsing integer overflow attempt RuleID : 24487 - Revision : 9 - Type : FILE-PDF |
2014-01-10 | Microsoft Windows kernel-mode drivers core font parsing integer overflow attempt RuleID : 24486 - Revision : 8 - Type : FILE-PDF |
2014-01-10 | Microsoft Windows kernel-mode drivers core font parsing integer overflow attempt RuleID : 24485 - Revision : 8 - Type : FILE-PDF |
2014-01-10 | Microsoft Windows kernel-mode drivers core font parsing integer overflow attempt RuleID : 23508 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Microsoft Windows EOT font parsing integer overflow attempt RuleID : 16232 - Revision : 9 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows kernel-mode drivers core font parsing integer overflow attempt RuleID : 16231 - Revision : 22 - Type : FILE-PDF |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-11-10 | Name : The remote Windows kernel is affected by remote privilege escalation vulnerab... File : smb_nt_ms09-065.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:09:58 |
|
2024-11-28 12:19:26 |
|
2023-12-07 21:28:05 |
|
2021-05-04 12:09:50 |
|
2021-04-22 01:10:11 |
|
2020-05-23 00:24:03 |
|
2018-10-13 00:22:50 |
|
2017-09-19 09:23:18 |
|
2016-08-31 12:01:50 |
|
2016-06-28 17:46:15 |
|
2016-04-26 18:58:53 |
|
2014-02-17 10:50:51 |
|
2013-05-10 23:54:13 |
|