The RPCSS service in Microsoft Windows XP SP2 and SP3 and Server 2003 SP1 and SP2 does not properly implement isolation among a set of distinct processes that (1) all run under the NetworkService account or (2) all run under the LocalService account, which allows local users to gain privileges by accessing the resources of one of the processes, aka "Windows RPCSS Service Isolation Vulnerability."
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:59
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://osvdb.org/53667 - | |
| References | () http://www.securitytracker.com/id?1022044 - | |
| References | () http://www.us-cert.gov/cas/techalerts/TA09-104A.html - US Government Resource | |
| References | () http://www.vupen.com/english/advisories/2009/1026 - | |
| References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-012 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6147 - | 
Information
                Published : 2009-04-15 08:00
Updated : 2025-04-09 00:30
NVD link : CVE-2009-0079
Mitre link : CVE-2009-0079
CVE.ORG link : CVE-2009-0079
JSON object : View
Products Affected
                microsoft
- windows_xp
- windows_server_2003
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
