Executive Summary
Summary | |
---|---|
Title | Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (968537) |
Informations | |||
---|---|---|---|
Name | MS09-025 | First vendor Publication | 2009-06-09 |
Vendor | Microsoft | Last vendor Modification | 2009-06-09 |
Severity (Vendor) | Important | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: Bulletin published.Summary: This security update resolves two publicly disclosed and two privately reported vulnerabilities in the Windows kernel that could allow elevation of privilege. An attacker who successfully exploited any of these vulnerabilities could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS09-025.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:5912 | |||
Oval ID: | oval:org.mitre.oval:def:5912 | ||
Title: | Windows Driver Class Registration Vulnerability | ||
Description: | The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate an argument to an unspecified system call, which allows local users to gain privileges via a crafted application, aka "Windows Driver Class Registration Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-1125 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6016 | |||
Oval ID: | oval:org.mitre.oval:def:6016 | ||
Title: | Windows Desktop Parameter Edit Vulnerability | ||
Description: | The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly validate the user-mode input associated with the editing of an unspecified desktop parameter, which allows local users to gain privileges via a crafted application, aka "Windows Desktop Parameter Edit Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-1126 | Version: | 1 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6206 | |||
Oval ID: | oval:org.mitre.oval:def:6206 | ||
Title: | Windows Kernel Desktop Vulnerability | ||
Description: | The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Desktop Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-1123 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6231 | |||
Oval ID: | oval:org.mitre.oval:def:6231 | ||
Title: | Windows Kernel Pointer Validation Vulnerability | ||
Description: | The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate user-mode pointers in unspecified error conditions, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Pointer Validation Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-1124 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-06-10 | Name : Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (968537) File : nvt/secpod_ms09-025.nasl |
2009-06-02 | Name : Windows XP 'SPI_GETDESKWALLPAPER' DoS Vulnerability File : nvt/secpod_ms_win_xp_spi_dos_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
54943 | Microsoft Windows Kernel Desktop Parameter Manipulation Local Privilege Escal... |
54942 | Microsoft Windows Kernel Driver Class Registration Local Privilege Escalation |
54941 | Microsoft Windows Kernel User Mode Pointer Passing Local Privilege Escalation |
54940 | Microsoft Windows Kernel Desktop Object Manipulation Local Privilege Escalation |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-06-10 | Name : The remote Windows kernel is affected by local privilege escalation vulnerabi... File : smb_nt_ms09-025.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:46:15 |
|