MS09-065: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (969947)

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote Windows kernel is affected by remote privilege escalation
vulnerabilities.

Description :

The remote host contains a version of the Windows kernel that is
affected by multiple vulnerabilities :

- A NULL pointer dereferencing vulnerability allowing a
local user to elevate his privileges (CVE-2009-1127)

- Insufficient validation of certain input passed to GDI
from user mode allows a local user to run arbitrary
code in kernel mode. (CVE-2009-2513)

- A parsing vulnerability when decoding a specially
crafted Embedded OpenType (EOT) font may allow a remote
user to execute arbitrary code on the remote host by
luring a user of the remote host into viewing a web
page containing such a malformed font. (CVE-2009-2514)

See also :

http://technet.microsoft.com/en-us/security/bulletin/MS09-065

Solution :

Microsoft has released a set of patches for Windows 2000, XP, 2003,
Vista and 2008.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 42439 ()

Bugtraq ID: 36029
36939
36941

CVE ID: CVE-2009-1127
CVE-2009-2513
CVE-2009-2514