SB2009060901 - Multiple priviledge escalation vulnerabilities in Microsoft Windows
Published: June 9, 2009 Updated: March 16, 2017
Security Bulletin ID
SB2009060901
Severity
Medium
Patch available
YES
Number of vulnerabilities
4
Exploitation vector
Local access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Privilege escalation (CVE-ID: CVE-2009-1126)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to improper validation of user-mode input. By running a malicious application, a local attacker can edit an unspecified desktop parameter and execute arbitrary code in kernel mode.
Successful exploitation of the vulnerability results in privilege escalation allowing to execute arbitrary code and take complete control of an affected system.
2) Privilege escalation (CVE-ID: CVE-2009-1125)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to improper validation of an argument to an unspecified system call. By running a malicious application, a local attacker can submit malformed calls to the Windows Kernel and execute arbitrary code in kernel mode.
Successful exploitation of the vulnerability results in privilege escalation allowing to execute arbitrary code and take complete control of an affected system.
3) Privilege escalation (CVE-ID: CVE-2009-1124)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to improper validation of changes in certain kernel objects. By running a malicious application, a local attacker can submit malformed calls to the Windows Kernel and execute arbitrary code in kernel mode.
Successful exploitation of the vulnerability results in privilege escalation allowing to execute arbitrary code and take complete control of an affected system.
4) Privilege escalation (CVE-ID: CVE-2009-1123)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to improper validation of changes in certain kernel objects. By running a malicious application, a local attacker can submit malformed calls to the Windows Kernel and execute arbitrary code in kernel mode.
Successful exploitation of the vulnerability results in privilege escalation allowing to execute arbitrary code and take complete control of an affected system.
Note: according to reports this vulnerability was being actively exploited before Microsoft issued security patch.
Remediation
Install update from vendor's website.