MS09-065: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (969947)

high Nessus Plugin ID 42439

Synopsis

The remote Windows kernel is affected by remote privilege escalation vulnerabilities.

Description

The remote host contains a version of the Windows kernel that is affected by multiple vulnerabilities :

- A NULL pointer dereferencing vulnerability allowing a local user to elevate his privileges (CVE-2009-1127)

- Insufficient validation of certain input passed to GDI from user mode allows a local user to run arbitrary code in kernel mode. (CVE-2009-2513)

- A parsing vulnerability when decoding a specially crafted Embedded OpenType (EOT) font may allow a remote user to execute arbitrary code on the remote host by luring a user of the remote host into viewing a web page containing such a malformed font. (CVE-2009-2514)

Solution

Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista and 2008.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2009/ms09-065

Plugin Details

Severity: High

ID: 42439

File Name: smb_nt_ms09-065.nasl

Version: 1.26

Type: local

Agent: windows

Published: 11/10/2009

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/10/2009

Vulnerability Publication Date: 11/10/2009

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-1127, CVE-2009-2513, CVE-2009-2514

BID: 36029, 36939, 36941

CWE: 20, 94

MSFT: MS09-065

MSKB: 969947