Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2004-1748 | First vendor Publication | 2004-12-31 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 2.1 | Attack Range | Local |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
NtRegmon before 6.12 allows local users to cause a denial of service (crash), while NtRegmon is running, via invalid pointers to hook functions such as ZwSetQueryValue. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1748 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
9178 | NtRegmon Unvalidated Pointer Referencing Local DoS NtRegmon contains a flaw that may allow a local denial of service. When NtRegmon is running with privileges, any user can crash the system because NtRegmon doesn't properly check argument pointers supplied to ZwSetQureyValue kernel hook. This may result in a loss availability for the Windows machine. |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:22:40 |
|
2024-11-28 12:06:24 |
|
2021-04-22 01:02:45 |
|
2020-05-23 01:36:16 |
|
2020-05-23 00:16:04 |
|
2017-07-11 12:01:39 |
|
2016-10-18 12:01:28 |
|
2013-05-11 11:46:00 |
|