First published: Mon Aug 03 2009(Updated: )
** DISPUTED ** The NtUserConsoleControl function in win32k.sys in Microsoft Windows XP SP2 and SP3, and Server 2003 before SP1, allows local administrators to bypass unspecified "security software" and gain privileges via a crafted call that triggers an overwrite of an arbitrary memory location. NOTE: the vendor disputes the significance of this report, stating that 'the Administrator to SYSTEM "escalation" is not a security boundary we defend.'
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2653 has a moderate severity level due to its potential for privilege escalation.
Mitigation for CVE-2009-2653 involves applying all relevant security patches for affected versions of Windows.
CVE-2009-2653 affects Microsoft Windows XP SP2, SP3, and Windows Server 2003 prior to SP1.
The vulnerability in CVE-2009-2653 allows local administrators to bypass security software by exploiting memory overwrites.
CVE-2009-2653 is a local vulnerability, requiring local access to the affected system to exploit.