Executive Summary

Title Microsoft Windows Services for UNIX privilege escalation vulnerability
Name VU#768440 First vendor Publication 2007-09-12
Vendor VU-CERT Last vendor Modification 2007-09-12
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 6.9 Attack Range Local
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Vulnerability Note VU#768440

Microsoft Windows Services for UNIX privilege escalation vulnerability


Microsoft Windows Services for UNIX contains a vulnerability that may allow a local, authenticated attacker to gain elevated privileges.

I. Description

Windows Services for UNIX fails to properly handle setuid binary files. An attacker may be able to trigger this vulnerability by running a specially crafted setuid binary file.

For more information, please see Microsoft Security Bulletin MS07-053.

II. Impact

A local, authenticated attacker may be able to gain elevated privileges on a vulnerable system.

III. Solution

Microsoft has released updates in Microsoft Security Bulletin MS07-053 to address this issue.

Systems Affected

VendorStatusDate Updated
Microsoft CorporationVulnerable12-Sep-2007




This vulnerability was reported in Microsoft Security Bulletin MS07-053. Microsoft thanks Brian Reiter of WolfeReiter for reporting the vulnerability to them.

This document was written by Katie Steiner.

Other Information

Date Public09/11/2007
Date First Published09/12/2007 08:06:53 AM
Date Last Updated09/12/2007
CERT Advisory 
CVE NameCVE-2007-3036
Document Revision10

Original Source

Url : http://www.kb.cert.org/vuls/id/768440

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1275
Oval ID: oval:org.mitre.oval:def:1275
Title: Windows Services for UNIX Could Allow Elevation of Privilege
Description: Unspecified vulnerability in the (1) Windows Services for UNIX 3.0 and 3.5, and (2) Subsystem for UNIX-based Applications in Microsoft Windows 2000, XP, Server 2003, and Vista allows local users to gain privileges via unspecified vectors related to "certain setuid binary files."
Family: windows Class: vulnerability
Reference(s): CVE-2007-3036
Version: 1
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Definition Synopsis:

CPE : Common Platform Enumeration

Application 2

OpenVAS Exploits

Date Description
2011-01-18 Name : Vulnerability in Windows Services for UNIX Could Allow Elevation of Privilege...
File : nvt/gb_ms07-053.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
36935 Microsoft Windows Services for UNIX Local Privilege Escalation

Microsoft Windows Services for Unix contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when running a specially crafted setuid binary. Exact details of this condition have been withheld. This flaw may lead to a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2007-09-11 Name : A local user can elevate his privileges.
File : smb_nt_ms07-053.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
Date Informations
2016-04-26 18:27:52
  • Multiple Updates
2015-05-08 13:28:08
  • Multiple Updates
2013-05-11 12:26:44
  • Multiple Updates