smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/264441 | broken link mailing list third party advisory vdb entry |
http://marc.info/?l=ntbugtraq&m=101614320402695&w=2 | mailing list |
http://www.securityfocus.com/bid/4287 | broken link third party advisory vdb entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-024 | patch vendor advisory |
http://www.securityfocus.com/archive/1/264927 | broken link mailing list third party advisory vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A76 | signature vdb entry broken link |
http://www.securityfocus.com/archive/1/262074 | patch mailing list vdb entry exploit vendor advisory broken link third party advisory |
http://www.iss.net/security_center/static/8462.php | patch vendor advisory broken link vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A158 | signature vdb entry broken link |