This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.
The remote Windows kernel is affected by remote privilege escalation
The remote host contains a version of the Windows kernel that is
affected by multiple vulnerabilities :
- A NULL pointer dereferencing vulnerability allowing a
local user to elevate his privileges (CVE-2009-1127)
- Insufficient validation of certain input passed to GDI
from user mode allows a local user to run arbitrary
code in kernel mode. (CVE-2009-2513)
- A parsing vulnerability when decoding a specially
crafted Embedded OpenType (EOT) font may allow a remote
user to execute arbitrary code on the remote host by
luring a user of the remote host into viewing a web
page containing such a malformed font. (CVE-2009-2514)
See also :
Microsoft has released a set of patches for Windows 2000, XP, 2003,
Vista and 2008.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 42439 ()
Bugtraq ID: 360293693936941
CVE ID: CVE-2009-1127CVE-2009-2513CVE-2009-2514
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.