First published: Wed Jun 10 2009(Updated: )
The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Desktop Vulnerability."
Credit: secure@microsoft.com secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows Server | =sp2-x64 | |
Microsoft Windows Server | =sp2-x32 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows XP | =sp3 | |
Microsoft Windows Vista | ||
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1123 is classified as a high-severity vulnerability that allows local users to gain elevated privileges.
To fix CVE-2009-1123, you should apply the latest security updates or patches provided by Microsoft for your affected Windows version.
CVE-2009-1123 affects Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista, and Server 2008 SP2.
CVE-2009-1123 cannot be exploited remotely; it requires local user access to execute the crafted application.
There are no official workarounds for CVE-2009-1123; the recommended action is to apply the security patches from Microsoft.