Integer overflow in Memory Manager in Microsoft Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows local users to gain privileges via a crafted application that triggers an erroneous decrement of a variable, related to validation of parameters for Virtual Address Descriptors (VADs) and a "memory allocation mapping error," aka "Virtual Address Descriptor Elevation of Privilege Vulnerability."
Weaknesses in this category are related to improper calculation or conversion of numbers.
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Link | Tags |
---|---|
http://secunia.com/advisories/32251 | third party advisory patch vendor advisory |
http://marc.info/?l=bugtraq&m=122479227205998&w=2 | vendor advisory |
http://www.vupen.com/english/advisories/2008/2815 | vdb entry |
http://www.securitytracker.com/id?1021051 | vdb entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-064 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45571 | vdb entry |
http://www.securityfocus.com/bid/31675 | vdb entry patch |
http://www.us-cert.gov/cas/techalerts/TA08-288A.html | third party advisory us government resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5343 | vdb entry signature |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45572 | vdb entry |