Unrated severityNVD Advisory· Published Jun 10, 2009· Updated Apr 23, 2026
CVE-2009-0230
CVE-2009-0230
Description
The Windows Print Spooler in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows remote authenticated users to gain privileges via a crafted RPC message that triggers loading of a DLL file from an arbitrary directory, aka "Print Spooler Load Library Vulnerability."
Affected products
17- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:itanium:*
- cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server:2008:*:*:*:*:*:itanium:*+ 1 more
- cpe:2.3:o:microsoft:windows_server:2008:*:*:*:*:*:itanium:*
- cpe:2.3:o:microsoft:windows_server:2008:*:sp2:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- secunia.com/advisories/35365nvdThird Party Advisory
- support.avaya.com/elmodocs2/security/ASA-2009-217.htmnvdThird Party Advisory
- www.securityfocus.com/bid/35209nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- www.us-cert.gov/cas/techalerts/TA09-160A.htmlnvdThird Party AdvisoryUS Government Resource
- www.vupen.com/english/advisories/2009/1541nvdThird Party Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6287nvdThird Party Advisory
- osvdb.org/54934nvdBroken Link
- docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022nvd
News mentions
0No linked articles in our index yet.