Check Point Advisories

Workaround for Microsoft Windows Kernel Input Validation Remote Code Execution Vulnerability (MS09-006)

Check Point Reference: SBP-2009-06
Date Published: 10 Mar 2009
Severity: Critical
Last Updated: Thursday 01 January, 2009
Source: Microsoft Security Bulletin MS09-006
Industry Reference:CVE-2009-0081
Protection Provided by:
Who is Vulnerable? Microsoft Windows 2000 SP4
Windows XP SP2
Windows XP SP3
Windows XP Professional x64 Edition
Windows XP Professional x64 Edition SP2
Windows Server 2003 SP1
Windows Server 2003 SP2
Windows Server 2003 x64 Edition
Windows Server 2003 x64 Edition SP2
Windows Server 2003 with SP1 (Itanium)
Windows Server 2003 with SP2 (Itanium)
Windows Vista
Windows Vista SP1
Windows Vista x64 Edition
Windows Vista x64 Edition SP1
Windows Server 2008 for 32-bit Systems
Windows Server 2008 for x64-based Systems
Windows Server 2008 (Itanium)
Vulnerability Description A remote code execution vulnerability has been discovered in the Windows kernel. The Windows kernel is the core of the operating system. It provides system level services, allocates processor time to processes, and manages error handling. This vulnerability is caused by the improper validation of input passed from user mode through the kernel component of the graphics device interface (GDI). Successful exploitation of this vulnerability may allow execution of arbitrary code on an affected system.
Update/Patch AvaliableApply patches:
Microsoft Security Bulletin MS09-006
Vulnerability DetailsThe vulnerability is due to an error in the Windows kernel that fails to properly validate input passed from user mode through the kernel component of GDI. A remote attacker may trigger this issue by convincing a user to open a specially crafted EMF image file. EMF is an image format that can contain both vector information and bitmap information. By persuading a user to open a specially crafted EMF image file, an attacker could take complete control of an affected system.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK