CVE-2009-1123
high-risk
Published 2009-06-10
The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly validate changes to unspecified kernel objects, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Desktop Vulnerability."
Do I need to act?
~
4.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (8)
Affected Vendors
References (15)
Broken Link
http://osvdb.org/54940
Broken Link
http://secunia.com/advisories/35372
Broken Link
http://www.securitytracker.com/id?1022359
Broken Link
http://osvdb.org/54940
Broken Link
http://secunia.com/advisories/35372
Broken Link
http://www.securitytracker.com/id?1022359
53
/ 100
high-risk
Severity
24/34 · High
Exploitability
15/34 · Moderate
Exposure
14/34 · Moderate