First published: Tue Mar 10 2009(Updated: )
The Secure Channel (aka SChannel) authentication component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, when certificate authentication is used, does not properly validate the client's key exchange data in Transport Layer Security (TLS) handshake messages, which allows remote attackers to spoof authentication by crafting a TLS packet based on knowledge of the certificate but not the private key, aka "SChannel Spoofing Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Vista | ||
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =gold | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows Vista | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0085 is classified as a critical vulnerability due to improper validation in the Secure Channel, leading to possible exploitation.
To fix CVE-2009-0085, you should apply the relevant security updates provided by Microsoft for the affected operating systems.
CVE-2009-0085 affects Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Windows Vista, and Windows Server 2008.
CVE-2009-0085 is a security vulnerability related to certificate authentication in the Transport Layer Security (TLS) implementation.
Attackers exploiting CVE-2009-0085 may gain unauthorized access by bypassing security measures due to the faulty key exchange validation.