Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2004-2527 | First vendor Publication | 2004-12-31 |
Vendor | Cve | Last vendor Modification | 2017-07-11 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 5.4 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The local and remote desktop login screens in Microsoft Windows XP before SP2 and 2003 allow remote attackers to cause a denial of service (CPU and memory consumption) by repeatedly using the WinKey+"U" key combination, which causes multiple copies of Windows Utility Manager to be loaded more quickly than they can be closed when the copies detect that another instance is running. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2527 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
8368 | Microsoft Windows XP/2003 Login Screen Consumption DoS Microsoft Windows contains a flaw that may allow an attacker to cause the system to hard lock. The issue is triggered when the WinKey and the "U" are held down at the login screen. The system does not properly handle the input causing the system to slow down and eventually use CPU and/or memory before locking up. If the "remote desktop" feature is enabled, this can be used to affect a system remotely. |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2020-05-23 00:16:11 |
|
2017-07-11 12:01:45 |
|
2016-06-28 15:12:18 |
|
2013-05-11 11:49:20 |
|