Vulnerability Name: CVE-2009-1123 (CCN-50779) Assigned: 2009-06-09 Published: 2009-06-09 Updated: 2019-02-26 Summary: The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Desktop Vulnerability." CVSS v3 Severity: 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )5.6 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )5.6 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-20 Vulnerability Consequences: Gain Privileges References: Source: MITRE Type: CNACVE-2009-1123 Source: OSVDB Type: UNKNOWN54940 Source: CCN Type: SA35372Microsoft Windows Kernel Privilege Escalation Vulnerabilities Source: SECUNIA Type: UNKNOWN35372 Source: CCN Type: SECTRACK ID: 1022359Windows Kernel Bugs Let Local Users Gain Elevated Privileges Source: CCN Type: ASA-2009-223MS09-025 Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (968537) Source: CCN Type: Microsoft Security Bulletin MS11-087Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2639417) Source: CCN Type: Microsoft Security Bulletin MS12-008Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2660465) Source: CCN Type: Microsoft Security Bulletin MS12-018Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2641653) Source: CCN Type: Microsoft Security Bulletin MS12-034Combined Security Update for Microsoft Office, Windows, .NET Framework, and Silverlight (2681578) Source: CCN Type: Microsoft Security Bulletin MS13-022Vulnerability in Silverlight Could Allow Remote Code Execution (2814124) Source: CCN Type: Microsoft Security Bulletin MS13-054Vulnerability in Windows Components Could Allow Remote Code Execution (2848295) Source: CCN Type: Microsoft Security Bulletin MS14-038Vulnerability in Windows Journal Could Allow Remote Code Execution (2975689) Source: CCN Type: Microsoft Security Bulletin MS09-025Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (968537) Source: CCN Type: Microsoft Security Bulletin MS09-065Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (969947) Source: CCN Type: Microsoft Security Bulletin MS10-032Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (979559) Source: CCN Type: Microsoft Security Bulletin MS10-048Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2160329) Source: CCN Type: Microsoft Security Bulletin MS10-073Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (981957) Source: CCN Type: Microsoft Security Bulletin MS10-098Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2436673) Source: CCN Type: Microsoft Security Bulletin MS11-012Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2479628) Source: CCN Type: Microsoft Security Bulletin MS11-034Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2506223) Source: CCN Type: Microsoft Security Bulletin MS11-041Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2525694) Source: CCN Type: Microsoft Security Bulletin MS11-054Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2555917) Source: CCN Type: Microsoft Security Bulletin MS11-077Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2567053) Source: CCN Type: Microsoft Security Bulletin MS11-084Vulnerability in Windows Kernel-Mode Drivers Could Allow Denial of Service (2617657) Source: CCN Type: OSVDB ID: 54940Microsoft Windows Kernel Desktop Object Manipulation Local Privilege Escalation Source: CCN Type: BID-35121Microsoft Windows 'win32k.sys' Local Privilege Escalation Vulnerability Source: SECTRACK Type: UNKNOWN1022359 Source: CERT Type: US Government ResourceTA09-160A Source: VUPEN Type: UNKNOWNADV-2009-1544 Source: MS Type: UNKNOWNMS09-025 Source: XF Type: UNKNOWNwin-kernel-kernel-priv-escalation(50779) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:6206 Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCYKNOWN EXPLOITED VULNERABILITIES CATALOG Vulnerable Configuration: Configuration 1 :cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_vista:*:*:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:*:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:*:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:* OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows:server_2003:*:sp2:*:*:*:*:* OR cpe:/o:microsoft:windows:server_2003:*:sp2:*:*:*:itanium:* OR cpe:/o:microsoft:windows:server_2003:*:sp2:*:*:*:x64:* OR cpe:/o:microsoft:windows_vista:::~~~~x64~:*:*:*:*:* OR cpe:/o:microsoft:windows_xp::sp2:x64:*:professional:*:*:* OR cpe:/o:microsoft:windows_vista:-:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:sp1:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:itanium:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x64:* OR cpe:/o:microsoft:windows:xp:sp3:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista::sp2:~~~~x64~:*:*:*:*:* OR cpe:/o:microsoft:windows_vista::sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:itanium:* Denotes that component is vulnerable Oval Definitions BACK
microsoft windows 2000 * sp4
microsoft windows server 2003 * sp2
microsoft windows server 2008 *
microsoft windows server 2008 *
microsoft windows server 2008 * sp2
microsoft windows server 2008 sp2 x32
microsoft windows server 2008 sp2 x64
microsoft windows vista *
microsoft windows vista * sp1
microsoft windows vista * sp1
microsoft windows vista * sp2
microsoft windows vista * sp2
microsoft windows xp * sp2
microsoft windows xp * sp3
microsoft windows 2000 sp4
microsoft windows xp sp2
microsoft windows vista
microsoft windows server_2003
microsoft windows server_2003
microsoft windows server_2003
microsoft windows vista
microsoft windows xp sp2
microsoft windows vista sp1
microsoft windows vista sp1
microsoft windows server 2008
microsoft windows server 2008 -
microsoft windows server 2008 -
microsoft windows xp sp3
microsoft windows vista sp2
microsoft windows vista sp2
microsoft windows server 2008 sp2
microsoft windows server 2008 sp2
microsoft windows server 2008