Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2009-0081

EPSS 66.51% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2009-0081

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The graphics device interface (GDI) implementation in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate input received from user mode, which allows remote attackers to execute arbitrary code via a crafted (1) Windows Metafile (aka WMF) or (2) Enhanced Metafile (aka EMF) image file, aka "Windows Kernel Input Validation Vulnerability."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows Kernel GDI EMF/WMF 远程代码执性漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Windows是Microsoft公司开发的图形用户界面操作系统,是目前最为普遍使用的个人计算机系统部署的操作系统。 Microsoft Windows 2000 SP4,XP SP2和SP3,Server 2003 SP1和SP2,Vista Gold以及SP1,和Server的内核中的图形装置界面(GDI),没有试点各地教研从用户模式中接收的输入,这会允许远程攻击者可以借助一个特制的(1) Windows Metafile(又称WMF)或(2)增强的Metafile(又称EMF)图像文件,又称"Win
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2009-0081

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2009-0081

登录查看更多情报信息。

Same Patch Batch · n/a · 2009-03-10 · 19 CVEs total

CVE-2009-0860Netcordia NetMRI应用登录错误网页未明向量跨站脚本攻击漏洞
CVE-2009-0868Fujitsu Jasmine2000 Enterprise Edition WebLink HTTP响应分裂漏洞
CVE-2009-0867Fujitsu PRIMERGY BX300刀片服务器信息泄露漏洞
CVE-2009-0866phnews 权限许可和访问控制问题漏洞
CVE-2009-0865GeoVision LiveX ActiveX控件目录遍历漏洞
CVE-2009-0864Matteoiammarrone S-CMS 'logincookie'权限绕过漏洞
CVE-2009-0863Matteoiammarrone S-CMS 'admin/delete_page.php' SQL注入漏洞
CVE-2009-0862TangoCMS 'modules/page/hooks/listeners.php' 跨站脚本攻击漏洞
CVE-2009-0861Denorastats phpDenora IRC Channel Name跨站脚本攻击漏洞
CVE-2008-3547OpenTTD ‘gfx.cpp’ 缓冲区溢出漏洞
CVE-2009-0870Sun Solaris NFS Version 4 Server Kernel Module 本地拒绝服务漏洞
CVE-2009-0869IBM Tivoli HSM for Windows Client 远程缓冲区溢出漏洞
CVE-2009-0837Foxit Reader PDF文件处理多个代码执行漏洞
CVE-2009-0836Foxit Reader PDF文件处理缓冲区溢出和代码执行漏洞
CVE-2009-0191Foxit Reader PDF文件处理远程代码执行漏洞
CVE-2009-0085Microsoft Windows SChannel认证欺骗漏洞
CVE-2009-0083Microsoft Windows无效指针本地权限提升漏洞
CVE-2009-0082Microsoft Windows内核句柄本地权限提升漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2009-0081

No comments yet


Leave a comment