Executive Summary

Summary
Title Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (968537)
Informations
Name MS09-025 First vendor Publication 2009-06-09
Vendor Microsoft Last vendor Modification 2009-06-09
Severity (Vendor) Important Revision 1.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: Bulletin published.Summary: This security update resolves two publicly disclosed and two privately reported vulnerabilities in the Windows kernel that could allow elevation of privilege. An attacker who successfully exploited any of these vulnerabilities could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users.

Original Source

Url : http://www.microsoft.com/technet/security/bulletin/MS09-025.mspx

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5912
 
Oval ID: oval:org.mitre.oval:def:5912
Title: Windows Driver Class Registration Vulnerability
Description: The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate an argument to an unspecified system call, which allows local users to gain privileges via a crafted application, aka "Windows Driver Class Registration Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2009-1125
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6016
 
Oval ID: oval:org.mitre.oval:def:6016
Title: Windows Desktop Parameter Edit Vulnerability
Description: The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly validate the user-mode input associated with the editing of an unspecified desktop parameter, which allows local users to gain privileges via a crafted application, aka "Windows Desktop Parameter Edit Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2009-1126
Version: 1
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6206
 
Oval ID: oval:org.mitre.oval:def:6206
Title: Windows Kernel Desktop Vulnerability
Description: The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Desktop Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2009-1123
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6231
 
Oval ID: oval:org.mitre.oval:def:6231
Title: Windows Kernel Pointer Validation Vulnerability
Description: The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate user-mode pointers in unspecified error conditions, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Pointer Validation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2009-1124
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 1
Os 5
Os 4
Os 2

OpenVAS Exploits

Date Description
2009-06-10 Name : Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (968537)
File : nvt/secpod_ms09-025.nasl
2009-06-02 Name : Windows XP 'SPI_GETDESKWALLPAPER' DoS Vulnerability
File : nvt/secpod_ms_win_xp_spi_dos_vuln.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
54943 Microsoft Windows Kernel Desktop Parameter Manipulation Local Privilege Escal...

54942 Microsoft Windows Kernel Driver Class Registration Local Privilege Escalation

54941 Microsoft Windows Kernel User Mode Pointer Passing Local Privilege Escalation

54940 Microsoft Windows Kernel Desktop Object Manipulation Local Privilege Escalation

Nessus® Vulnerability Scanner

Date Description
2009-06-10 Name : The remote Windows kernel is affected by local privilege escalation vulnerabi...
File : smb_nt_ms09-025.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:46:15
  • Multiple Updates