Vulnerabilities > CVE-2002-0367 - Unspecified vulnerability in Microsoft Windows 2000 and Windows NT
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 3 |
Exploit-Db
description | Microsoft Windows 2000 / NT 4.0 Process Handle Local Privilege Elevation Vulnerability. CVE-2002-0367. Local exploit for windows platform |
id | EDB-ID:21344 |
last seen | 2016-02-02 |
modified | 2002-03-13 |
published | 2002-03-13 |
reporter | EliCZ |
source | https://www.exploit-db.com/download/21344/ |
title | Microsoft Windows 2000 / NT 4.0 - Process Handle Local Privilege Elevation Vulnerability |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS02-024.NASL |
description | The remote host contains a flaw in the Windows Debugger that could allow a local user to elevate his privileges. To exploit this vulnerability, a user needs to send a specially crafted code to the Debbuging handler to execute arbitrary code with SYSTEM privileges. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10964 |
published | 2002-05-23 |
reporter | This script is Copyright (C) 2002-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10964 |
title | MS02-024: Windows Debugger flaw can Lead to Elevated Privileges (320206) |
code |
|
Oval
accepted 2018-09-11T10:00:00.000-05:00 class vulnerability contributors name Tiffany Bergeron organization The MITRE Corporation name Jonathan Baker organization The MITRE Corporation
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit. family windows id oval:org.mitre.oval:def:158 status accepted submitted 2003-04-04T12:00:00.000-04:00 title Windows NT Process Handle Duplication Privilege Escalation version 70 accepted 2011-05-16T04:03:26.169-04:00 class vulnerability contributors name Tiffany Bergeron organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit. family windows id oval:org.mitre.oval:def:76 status accepted submitted 2003-04-04T12:00:00.000-04:00 title Windows 2000 Process Handle Duplication Privilege Escalation version 69
References
- http://www.securityfocus.com/archive/1/262074
- http://www.iss.net/security_center/static/8462.php
- http://www.securityfocus.com/archive/1/264441
- http://www.securityfocus.com/archive/1/264927
- http://www.securityfocus.com/bid/4287
- http://marc.info/?l=ntbugtraq&m=101614320402695&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A76
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A158
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-024