Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2002-0018 | First vendor Publication | 2002-03-08 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
In Microsoft Windows NT and Windows 2000, a trusting domain that receives authorization information from a trusted domain does not verify that the trusted domain is authoritative for all listed SIDs, which allows remote attackers to gain Domain Administrator privileges on the trusting domain by injecting SIDs from untrusted domains into the authorization data that comes from from the trusted domain. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0018 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-75 | Manipulating Writeable Configuration Files |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:159 | |||
Oval ID: | oval:org.mitre.oval:def:159 | ||
Title: | Windows NT Trusted Domain Loophole | ||
Description: | In Microsoft Windows NT and Windows 2000, a trusting domain that receives authorization information from a trusted domain does not verify that the trusted domain is authoritative for all listed SIDs, which allows remote attackers to gain Domain Administrator privileges on the trusting domain by injecting SIDs from untrusted domains into the authorization data that comes from from the trusted domain. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2002-0018 | Version: | 1 |
Platform(s): | Microsoft Windows NT | Product(s): | Windows NT 4.0 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:64 | |||
Oval ID: | oval:org.mitre.oval:def:64 | ||
Title: | Windows 2000 Trusted Domain Loophole | ||
Description: | In Microsoft Windows NT and Windows 2000, a trusting domain that receives authorization information from a trusted domain does not verify that the trusted domain is authoritative for all listed SIDs, which allows remote attackers to gain Domain Administrator privileges on the trusting domain by injecting SIDs from untrusted domains into the authorization data that comes from from the trusted domain. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2002-0018 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 | Product(s): | |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
2037 | Microsoft Windows Trusted Domain SID Remote Privilege Escalation |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2003-03-12 | Name : The remote host is vulnerable to privilege escalation. File : smb_nt_ms02-001.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:24:01 |
|
2024-11-28 12:04:55 |
|
2021-05-04 12:01:36 |
|
2021-04-22 01:01:44 |
|
2020-05-23 00:14:53 |
|
2018-10-13 00:22:24 |
|
2017-10-10 09:23:23 |
|
2016-04-26 12:05:04 |
|
2014-02-17 10:24:23 |
|
2013-05-11 12:07:53 |
|