** DISPUTED ** The NtUserConsoleControl function in win32k.sys in Microsoft Windows XP SP2 and SP3, and Server 2003 before SP1, allows local administrators to bypass unspecified "security software" and gain privileges via a crafted call that triggers an overwrite of an arbitrary memory location. NOTE: the vendor disputes the significance of this report, stating that 'the Administrator to SYSTEM "escalation" is not a security boundary we defend.'
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://blogs.technet.com/srd/archive/2009/06/11/latest-baidu-public-posting-requires-adminisrator-to-elevate.aspx - | |
References | () http://hi.baidu.com/azy0922/blog/item/f950cbc2890729130ef47783.html - Exploit | |
References | () http://osvdb.org/56780 - | |
References | () http://securitytracker.com/id?1022630 - | |
References | () http://www.exploit-db.com/exploits/9301 - | |
References | () http://www.ntinternals.org/index.html#09_07_30 - Exploit |
Information
Published : 2009-08-03 14:30
Updated : 2024-11-21 01:05
NVD link : CVE-2009-2653
Mitre link : CVE-2009-2653
CVE.ORG link : CVE-2009-2653
JSON object : View
Products Affected
microsoft
- windows_xp
- windows_server_2003
CWE
CWE-264
Permissions, Privileges, and Access Controls