Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2004-0208 | First vendor Publication | 2004-11-03 |
Vendor | Cve | Last vendor Modification | 2018-10-12 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0208 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1751 | |||
Oval ID: | oval:org.mitre.oval:def:1751 | ||
Title: | Windows XP/Server 2003 (64-Bit) VDM Privilege Escalation Vulnerability | ||
Description: | The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-0208 | Version: | 1 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | VDM |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:3161 | |||
Oval ID: | oval:org.mitre.oval:def:3161 | ||
Title: | Windows XP VDM Privilege Escalation Vulnerability | ||
Description: | The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-0208 | Version: | 1 |
Platform(s): | Microsoft Windows XP | Product(s): | VDM |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:3953 | |||
Oval ID: | oval:org.mitre.oval:def:3953 | ||
Title: | Windows NT VDM Privilege Escalation Vulnerability | ||
Description: | The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-0208 | Version: | 3 |
Platform(s): | Microsoft Windows NT | Product(s): | VDM |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:4316 | |||
Oval ID: | oval:org.mitre.oval:def:4316 | ||
Title: | Windows 2000 VDM Privilege Escalation Vulnerability | ||
Description: | The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-0208 | Version: | 1 |
Platform(s): | Microsoft Windows 2000 | Product(s): | VDM |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:4762 | |||
Oval ID: | oval:org.mitre.oval:def:4762 | ||
Title: | Windows NT Terminal Server VDM Privilege Escalation Vulnerability | ||
Description: | The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-0208 | Version: | 1 |
Platform(s): | Microsoft Windows NT | Product(s): | VDM |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 |
ExploitDB Exploits
id | Description |
---|---|
2004-10-20 | MS Windows Metafile (.emf) Heap Overflow Exploit (MS04-032) |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
10691 | Microsoft Windows Virtual DOS Machine Subsystem Local Privilege Escalation Windows contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered within a portion of the Windows kernel that handles 16-bit code within a Virtual DOS Machine will give special opcode byte sequence special treatment during relay to the 32-bit host code. With a specially crafted request, an attacker could use this to leverage increased privileges on the system. |
Snort® IPS/IDS
Date | Description |
---|---|
2016-03-14 | Microsoft emf file download request RuleID : 33740-community - Revision : 2 - Type : FILE-IMAGE |
2015-04-10 | Microsoft emf file download request RuleID : 33740 - Revision : 2 - Type : FILE-IMAGE |
2014-01-10 | Microsoft emf file download request RuleID : 2435-community - Revision : 33 - Type : FILE-IDENTIFY |
2014-01-10 | Microsoft emf file download request RuleID : 2435 - Revision : 33 - Type : FILE-IDENTIFY |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-10-12 | Name : Arbitrary code can be executed on the remote host. File : smb_nt_ms04-032.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2021-05-04 12:02:17 |
|
2021-04-22 01:02:26 |
|
2020-05-23 00:15:44 |
|
2018-10-13 00:22:28 |
|
2017-10-11 09:23:20 |
|
2017-07-11 12:01:24 |
|
2016-10-18 12:01:18 |
|
2016-04-26 12:47:47 |
|
2014-02-17 10:27:18 |
|
2013-05-11 11:40:25 |
|