MS09-065: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (969947)

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.

Synopsis :

The remote Windows kernel is affected by remote privilege escalation

Description :

The remote host contains a version of the Windows kernel that is
affected by multiple vulnerabilities :

- A NULL pointer dereferencing vulnerability allowing a
local user to elevate his privileges (CVE-2009-1127)

- Insufficient validation of certain input passed to GDI
from user mode allows a local user to run arbitrary
code in kernel mode. (CVE-2009-2513)

- A parsing vulnerability when decoding a specially
crafted Embedded OpenType (EOT) font may allow a remote
user to execute arbitrary code on the remote host by
luring a user of the remote host into viewing a web
page containing such a malformed font. (CVE-2009-2514)

See also :

Solution :

Microsoft has released a set of patches for Windows 2000, XP, 2003,
Vista and 2008.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 42439 ()

Bugtraq ID: 36029

CVE ID: CVE-2009-1127

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now