MS09-065: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (969947)

High Nessus Plugin ID 42439


The remote Windows kernel is affected by remote privilege escalation vulnerabilities.


The remote host contains a version of the Windows kernel that is affected by multiple vulnerabilities :

- A NULL pointer dereferencing vulnerability allowing a local user to elevate his privileges (CVE-2009-1127)

- Insufficient validation of certain input passed to GDI from user mode allows a local user to run arbitrary code in kernel mode. (CVE-2009-2513)

- A parsing vulnerability when decoding a specially crafted Embedded OpenType (EOT) font may allow a remote user to execute arbitrary code on the remote host by luring a user of the remote host into viewing a web page containing such a malformed font. (CVE-2009-2514)


Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista and 2008.

See Also

Plugin Details

Severity: High

ID: 42439

File Name: smb_nt_ms09-065.nasl

Version: $Revision: 1.24 $

Type: local

Agent: windows

Published: 2009/11/10

Modified: 2017/08/09

Dependencies: 57033, 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/11/10

Vulnerability Publication Date: 2009/11/10

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-1127, CVE-2009-2513, CVE-2009-2514

BID: 36029, 36939, 36941

OSVDB: 59867, 59868, 59869

MSFT: MS09-065

MSKB: 969947

EDB-ID: 10068

CWE: 20, 94