Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege
Description: This security update resolves two publicly disclosed and two privately reported vulnerabilities in the Windows kernel that could allow elevation of privilege. An attacker who successfully exploited any of these vulnerabilities could execute arbitrary code and take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. The security update addresses these vulnerabilities by correcting the methods used for validating a change in specific kernel objects, for validating the input passed from user mode to the kernel, and for validating the argument passed to the system call.
Update type: Important
Release date: June 9, 2009
Applies to: All versions
Knowledge base: http://support.microsoft.com/kb/968537
- Windows Kernel Desktop Vulnerability- CVE-2009-1123
- Windows Kernel Pointer Validation Vulnerability- CVE-2009-1124
- Windows Driver Class Registration Vulnerability – CVE-2009-1125
- Windows Desktop Parameter Edit Vulnerability – CVE-2009-1126
For more information on this issue, including potential causes, workarounds, and resolutions, see: Microsoft KB Article KB968537.