Microsoft Windows线程池ACL本地权限提升漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117575 漏洞类型 其他
发布时间 2009-04-14 更新时间 2009-04-17
CVE编号 CVE-2009-0080 CNNVD-ID CNNVD-200904-276
漏洞平台 Windows CVSS评分 6.9
|漏洞来源
https://www.exploit-db.com/exploits/32893
https://www.securityfocus.com/bid/34444
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200904-276
|漏洞详情
MicrosoftWindows是美国微软(Microsoft)公司发布的一系列操作系统。Windows对当前ThreadPool中的线程设置了错误的ACL,本地攻击者可以利用令牌劫持的方式获得权限提升。成功利用此漏洞的攻击者可以完全控制受影响的系统,攻击者可随后安装程序;查看、更改或删除数据;或者创建拥有完全用户权限的新帐户。
|漏洞EXP
source: http://www.securityfocus.com/bid/34444/info

Microsoft Windows is prone to a privilege-escalation vulnerability.

Successful exploits may allow attackers to elevate their privileges to LocalSystem, which would facilitate the complete compromise of affected computers.

The issue affects the following:

Windows Vista
Windows Server 2008 

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32893.zip
|受影响的产品
Microsoft Windows Vista x64 Edition SP1 Microsoft Windows Vista x64 Edition 0 Microsoft Windows Vista Ultimate 64-bit edition SP1 Microsoft Windows Vista Ultimate 64-bit edition 0 Microso
|参考资料

来源:US-CERT
名称:TA09-104A
链接:http://www.us-cert.gov/cas/techalerts/TA09-104A.html
来源:MS
名称:MS09-012
链接:http://www.microsoft.com/technet/security/Bulletin/MS09-012.mspx
来源:VUPEN
名称:ADV-2009-1026
链接:http://www.vupen.com/english/advisories/2009/1026
来源:SECTRACK
名称:1022044
链接:http://www.securitytracker.com/id?1022044
来源:OSVDB
名称:53668
链接:http://osvdb.org/53668