CVE-2009-1542
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
15/07/2009
Last modified:
09/04/2025
Description
The Virtual Machine Monitor (VMM) in Microsoft Virtual PC 2004 SP1, 2007, and 2007 SP1, and Microsoft Virtual Server 2005 R2 SP1, does not enforce CPU privilege-level requirements for all machine instructions, which allows guest OS users to execute arbitrary kernel-mode code and gain privileges within the guest OS via a crafted application, aka "Virtual PC and Virtual Server Privileged Instruction Decoding Vulnerability."
Impact
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:microsoft:virtual_pc:2004:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:virtual_pc:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:virtual_pc:2007:*:x64:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:virtual_pc:2007:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:virtual_server:2005:r2_sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:virtual_server:2005:r2_sp1:x64:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/35808
- http://www.securitytracker.com/id?1022544=
- http://www.us-cert.gov/cas/techalerts/TA09-195A.html
- http://www.vupen.com/english/advisories/2009/1890
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-033
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6166
- http://secunia.com/advisories/35808
- http://www.securitytracker.com/id?1022544=
- http://www.us-cert.gov/cas/techalerts/TA09-195A.html
- http://www.vupen.com/english/advisories/2009/1890
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-033
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6166



