smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/264441 | mailing list vdb entry broken link third party advisory |
http://marc.info/?l=ntbugtraq&m=101614320402695&w=2 | mailing list |
http://www.securityfocus.com/bid/4287 | vdb entry broken link third party advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-024 | vendor advisory patch |
http://www.securityfocus.com/archive/1/264927 | mailing list vdb entry broken link third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A76 | broken link signature vdb entry |
http://www.securityfocus.com/archive/1/262074 | vendor advisory exploit mailing list patch broken link vdb entry third party advisory |
http://www.iss.net/security_center/static/8462.php | vendor advisory vdb entry patch broken link |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A158 | broken link signature vdb entry |