New Search

Virtual PC and Virtual Server Privileged Instruction Decoding Vulnerability

oval:org.mitre.oval:def:6166

The Virtual Machine Monitor (VMM) in Microsoft Virtual PC 2004 SP1 2007 and 2007 SP1 and Microsoft Virtual Server 2005 R2 SP1 does not enforce CPU privilege-level requirements for all machine instructions which allows guest OS users to execute arbitrary kernel-mode code and gain privileges within the guest OS via a crafted application aka "Virtual PC and Virtual Server Privileged Instruction Decoding Vulnerability."

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows Vista
  • Microsoft Windows Server 2008
  • Microsoft Windows XP
  • Microsoft Windows 2000
  • Microsoft Windows Server 2003
Class:
vulnerability
Reference(s):
  • CVE-2009-1542
Product(s):
  • Microsoft Virtual PC 2004
  • Microsoft Virtual PC 2007
  • Microsoft Virtual Server 2005