The component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code.
Link | Tags |
---|---|
http://www.ciac.org/ciac/bulletins/o-114.shtml | third party advisory government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1718 | signature vdb entry |
http://www.kb.cert.org/vuls/id/783748 | patch third party advisory us government resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15714 | vdb entry |
http://www.eeye.com/html/Research/Advisories/AD20040413E.html | patch vendor advisory third party advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 | vendor advisory |
http://www.securityfocus.com/bid/10117 | vdb entry |
http://www.us-cert.gov/cas/techalerts/TA04-104A.html | third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1512 | signature vdb entry |
http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020070.html | mailing list |