CVE-2009-0081

The graphics device interface (GDI) implementation in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate input received from user mode, which allows remote attackers to execute arbitrary code via a crafted (1) Windows Metafile (aka WMF) or (2) Enhanced Metafile (aka EMF) image file, aka "Windows Kernel Input Validation Vulnerability."
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:sp1:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:gold:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*

History

21 Nov 2024, 00:59

Type Values Removed Values Added
References () http://osvdb.org/52522 - () http://osvdb.org/52522 -
References () http://secunia.com/advisories/34117 - () http://secunia.com/advisories/34117 -
References () http://support.avaya.com/elmodocs2/security/ASA-2009-079.htm - () http://support.avaya.com/elmodocs2/security/ASA-2009-079.htm -
References () http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=842987&poid= - () http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=842987&poid= -
References () http://www.securityfocus.com/bid/34012 - () http://www.securityfocus.com/bid/34012 -
References () http://www.securitytracker.com/id?1021826 - () http://www.securitytracker.com/id?1021826 -
References () http://www.us-cert.gov/cas/techalerts/TA09-069A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA09-069A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2009/0659 - () http://www.vupen.com/english/advisories/2009/0659 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-006 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-006 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6202 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6202 -

07 Dec 2023, 18:38

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:*

Information

Published : 2009-03-10 20:30

Updated : 2024-11-21 00:59


NVD link : CVE-2009-0081

Mitre link : CVE-2009-0081

CVE.ORG link : CVE-2009-0081


JSON object : View

Products Affected

microsoft

  • windows_vista
  • windows_xp
  • windows_2000
  • windows_server_2003
  • windows_server_2008
CWE
CWE-20

Improper Input Validation