The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate parameters sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability."
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://marc.info/?l=bugtraq&m=122479227205998&w=2 | mailing list third party advisory vendor advisory |
http://secunia.com/advisories/32247 | third party advisory patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45543 | vdb entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061 | patch vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6045 | vdb entry third party advisory signature |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45544 | vdb entry |
http://www.vupen.com/english/advisories/2008/2812 | vdb entry broken link |
http://www.securitytracker.com/id?1021046 | vdb entry third party advisory |
http://www.us-cert.gov/cas/techalerts/TA08-288A.html | third party advisory us government resource |
http://www.securityfocus.com/bid/31652 | vdb entry third party advisory patch |