New Search

Windows Kernel Pointer Validation Vulnerability

oval:org.mitre.oval:def:6231

The kernel in Microsoft Windows 2000 SP4 XP SP2 and SP3 Server 2003 SP2 Vista Gold SP1 and SP2 and Server 2008 SP2 does not properly validate user-mode pointers in unspecified error conditions which allows local users to gain privileges via a crafted application aka "Windows Kernel Pointer Validation Vulnerability."

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows XP
  • Microsoft Windows Vista
  • Microsoft Windows Server 2008
  • Microsoft Windows Server 2003
  • Microsoft Windows 2000
Class:
vulnerability
Reference(s):
  • CVE-2009-1124
Product(s):