MS09-006: Vulnerabilities in Windows Kernel Could Allow Remote Code Execution (958690)

High Nessus Plugin ID 35822


It is possible to execute arbitrary code on the remote host.


The remote host contains a version of the Windows kernel that is affected by vulnerabilities :

- A remote code execution vulnerability exists due to improper validation of input passed from user mode through the kernel component of GDI. Successful exploitation requires that a user on the affected host view a specially crafted EMF or WMF image file, perhaps by being tricked into visiting a malicious website, and could lead to a complete system compromise.

- A local privilege escalation vulnerability exists due to the way the kernel validates handles. (CVE-2009-0082)

- A local privilege escalation vulnerability exists due to improper handling of a specially crafted invalid pointer.


Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista and 2008.

See Also

Plugin Details

Severity: High

ID: 35822

File Name: smb_nt_ms09-006.nasl

Version: 1.26

Type: local

Agent: windows

Published: 2009/03/11

Updated: 2018/11/15

Dependencies: 13855, 57033

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/03/10

Vulnerability Publication Date: 2009/03/10

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-0081, CVE-2009-0082, CVE-2009-0083

BID: 34012, 34025, 34027

MSFT: MS09-006

MSKB: 958690

CWE: 20