First published: Wed Apr 15 2009(Updated: )
The RPCSS service in Microsoft Windows XP SP2 and SP3 and Server 2003 SP1 and SP2 does not properly implement isolation among a set of distinct processes that (1) all run under the NetworkService account or (2) all run under the LocalService account, which allows local users to gain privileges by accessing the resources of one of the processes, aka "Windows RPCSS Service Isolation Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows XP | =sp2 | |
Microsoft Windows Server 2003 | ||
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows XP | ||
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows XP | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0079 is classified as a critical vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-2009-0079, install the appropriate security updates provided by Microsoft for affected versions of Windows XP and Windows Server 2003.
CVE-2009-0079 affects Microsoft Windows XP SP2 and SP3, as well as Microsoft Windows Server 2003 SP1 and SP2.
No, CVE-2009-0079 requires local access, which means it cannot be exploited remotely.
The potential impacts of CVE-2009-0079 include unauthorized local access that could lead to privilege escalation and possible system compromise.