[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-0081

Date: (C)2009-03-10   (M)2017-10-04
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











The graphics device interface (GDI) implementation in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate input received from user mode, which allows remote attackers to execute arbitrary code via a crafted (1) Windows Metafile (aka WMF) or (2) Enhanced Metafile (aka EMF) image file, aka "Windows Kernel Input Validation Vulnerability."

Reference:
SECTRACK-1021826
BID-34012
SECUNIA-34117
OSVDB-52522
ADV-2009-0659
MS09-006
TA09-069A
http://support.avaya.com/elmodocs2/security/ASA-2009-079.htm
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=842987&poid=

CPE    16
cpe:/o:microsoft:windows_vista::sp1
cpe:/o:microsoft:windows_xp::sp2:x64
cpe:/o:microsoft:windows_server_2008
cpe:/o:microsoft:windows_server_2003::sp2:x64
...
CWE    1
CWE-20
OVAL    2
oval:org.secpod.oval:def:2557
oval:org.mitre.oval:def:6202

© 2013 SecPod Technologies