The Virtual DOS Machine (VDM) in the Windows Kernel in Microsoft Windows NT 4.0; 2000 SP4; XP SP2; Server 2003, 2003 SP1, and 2003 SP2; and Windows Vista before June 2006; uses insecure permissions (PAGE_READWRITE) for a physical memory view, which allows local users to gain privileges by modifying the "zero page" during a race condition before the view is unmapped.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/466331/100/200/threaded | vendor advisory |
http://www.securityfocus.com/bid/23367 | vdb entry |
http://www.osvdb.org/34011 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1639 | vdb entry signature |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-022 | vendor advisory |
http://www.kb.cert.org/vuls/id/337953 | third party advisory us government resource |
http://www.vupen.com/english/advisories/2007/1326 | vdb entry vendor advisory |
http://www.securityfocus.com/archive/1/465232/100/0/threaded | mailing list |
http://secunia.com/advisories/24834 | third party advisory vendor advisory |
http://securitytracker.com/id?1017898 | vdb entry |
http://www.us-cert.gov/cas/techalerts/TA07-100A.html | third party advisory us government resource |
http://research.eeye.com/html/advisories/published/AD20070410a.html |