Check Point Reference: | SBP-2009-06 |
Date Published: | 10 Mar 2009 |
Severity: | Critical |
Last Updated: | Thursday 01 January, 2009 |
Source: | Microsoft Security Bulletin MS09-006 |
Industry Reference: | CVE-2009-0081 |
Protection Provided by: | |
Who is Vulnerable? | Microsoft Windows 2000 SP4 Windows XP SP2 Windows XP SP3 Windows XP Professional x64 Edition Windows XP Professional x64 Edition SP2 Windows Server 2003 SP1 Windows Server 2003 SP2 Windows Server 2003 x64 Edition Windows Server 2003 x64 Edition SP2 Windows Server 2003 with SP1 (Itanium) Windows Server 2003 with SP2 (Itanium) Windows Vista Windows Vista SP1 Windows Vista x64 Edition Windows Vista x64 Edition SP1 Windows Server 2008 for 32-bit Systems Windows Server 2008 for x64-based Systems Windows Server 2008 (Itanium) |
Vulnerability Description | A remote code execution vulnerability has been discovered in the Windows kernel. The Windows kernel is the core of the operating system. It provides system level services, allocates processor time to processes, and manages error handling. This vulnerability is caused by the improper validation of input passed from user mode through the kernel component of the graphics device interface (GDI). Successful exploitation of this vulnerability may allow execution of arbitrary code on an affected system. |
Update/Patch Avaliable | Apply patches: Microsoft Security Bulletin MS09-006 |
Vulnerability Details | The vulnerability is due to an error in the Windows kernel that fails to properly validate input passed from user mode through the kernel component of GDI. A remote attacker may trigger this issue by convincing a user to open a specially crafted EMF image file. EMF is an image format that can contain both vector information and bitmap information. By persuading a user to open a specially crafted EMF image file, an attacker could take complete control of an affected system. |