Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2004-0213 First vendor Publication 2004-08-06
Vendor Cve Last vendor Modification 2024-02-14

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7.8
Base Score 7.8 Environmental Score 7.8
impact SubScore 5.9 Temporal Score 7.8
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Utility Manager in Windows 2000 launches winhlp32.exe while Utility Manager is running with raised privileges, which allows local users to gain system privileges via a "Shatter" style attack that sends a Windows message to cause Utility Manager to launch winhlp32 by directly accessing the context sensitive help and bypassing the GUI, then sending another message to winhlp32 in order to open a user-selected file, a different vulnerability than CVE-2003-0908.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0213

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-12 Choosing a Message/Channel Identifier on a Public/Multicast Channel
CAPEC-36 Using Unpublished Web Service APIs
CAPEC-40 Manipulating Writeable Terminal Devices
CAPEC-56 Removing/short-circuiting 'guard logic'
CAPEC-62 Cross Site Request Forgery (aka Session Riding)
CAPEC-69 Target Programs with Elevated Privileges
CAPEC-225 Exploitation of Authentication

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-306 Missing Authentication for Critical Function (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:2495
 
Oval ID: oval:org.mitre.oval:def:2495
Title: Windows Utility Manager Shatter Message Vulnerability II
Description: Utility Manager in Windows 2000 launches winhlp32.exe while Utility Manager is running with raised privileges, which allows local users to gain system privileges via a "Shatter" style attack that sends a Windows message to cause Utility Manager to launch winhlp32 by directly accessing the context sensitive help and bypassing the GUI, then sending another message to winhlp32 in order to open a user-selected file, a different vulnerability than CVE-2003-0908.
Family: windows Class: vulnerability
Reference(s): CVE-2004-0213
Version: 2
Platform(s): Microsoft Windows 2000
Product(s): Utility Manager
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 3

ExploitDB Exploits

id Description
2008-05-15 Symantec Altiris Client Service 6.8.378 Local Privilege Escalation Exploit

Open Source Vulnerability Database (OSVDB)

Id Description
7792 Microsoft Windows 2000 Utility Manager Privilege Escalation

Nessus® Vulnerability Scanner

Date Description
2004-07-13 Name : Local users can elevate their privileges.
File : smb_nt_ms04-019.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BUGTRAQ http://marc.info/?l=bugtraq&m=108975382413405&w=2
CERT http://www.us-cert.gov/cas/techalerts/TA04-196A.html
CERT-VN http://www.kb.cert.org/vuls/id/868580
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/16592

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2024-02-14 21:28:27
  • Multiple Updates
2021-05-04 12:02:17
  • Multiple Updates
2021-04-22 01:02:26
  • Multiple Updates
2020-05-23 00:15:44
  • Multiple Updates
2019-04-30 21:19:18
  • Multiple Updates
2018-10-13 00:22:28
  • Multiple Updates
2017-10-11 09:23:21
  • Multiple Updates
2017-07-11 12:01:24
  • Multiple Updates
2016-10-18 12:01:18
  • Multiple Updates
2016-04-26 12:47:50
  • Multiple Updates
2014-02-17 10:27:19
  • Multiple Updates
2013-05-11 11:40:26
  • Multiple Updates