Vulnerabilities > CVE-2004-0893 - Unspecified vulnerability in Microsoft products
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."
Vulnerable Configurations
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS04-044.NASL |
description | The remote host is running version of the NT kernel and LSASS which could allow a local user to gain elevated privileged. An attacker who has the ability to execute arbitrary commands on the remote host could exploit these flaws to gain SYSTEM privileges. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15963 |
published | 2004-12-14 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15963 |
title | MS04-044: Vulnerabilities in Windows Kernel and LSASS (885835) |
code |
|
Oval
accepted 2008-03-24T04:00:12.876-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name John Hoyland organization Centennial Software name Jonathan Baker organization The MITRE Corporation
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." family windows id oval:org.mitre.oval:def:1321 status accepted submitted 2004-12-16T12:00:00.000-04:00 title Windows Kernel LPC Privilege Escalation Vulnerability (NT 4.0) version 72 accepted 2011-05-16T04:01:19.923-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Andrew Buttner organization The MITRE Corporation name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." family windows id oval:org.mitre.oval:def:1561 status accepted submitted 2004-12-16T12:00:00.000-04:00 title Windows Kernel LPC Privilege Escalation Vulnerability (Windows 2000) version 70 accepted 2005-02-23T09:25:00.000-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Robert L. Hollis organization ThreatGuard, Inc.
description The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." family windows id oval:org.mitre.oval:def:1581 status deprecated submitted 2005-01-05T12:00:00.000-04:00 title Suppressed Test OVAL1581 (Identical to OVAL4458) version 64 accepted 2011-05-16T04:02:00.070-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Ingrid Skoog organization The MITRE Corporation name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." family windows id oval:org.mitre.oval:def:1886 status accepted submitted 2005-01-05T12:00:00.000-04:00 title Windows Kernel LPC Privilege Escalation Vulnerability (32-bit XP,SP1) version 69 accepted 2011-05-16T04:02:17.381-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Ingrid Skoog organization The MITRE Corporation name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." family windows id oval:org.mitre.oval:def:2008 status accepted submitted 2005-01-05T12:00:00.000-04:00 title Windows Kernel LPC Privilege Escalation Vulnerability (64-bit XP) version 69 accepted 2008-03-24T04:00:33.323-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Jonathan Baker organization The MITRE Corporation
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." family windows id oval:org.mitre.oval:def:4021 status accepted submitted 2004-12-16T12:00:00.000-04:00 title Windows Kernel LPC Privilege Escalation Vulnerability (NT Terminal Server) version 71 accepted 2005-02-23T09:25:00.000-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation description The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." family windows id oval:org.mitre.oval:def:4458 status accepted submitted 2005-01-05T12:00:00.000-04:00 title Windows Kernel LPC Privilege Escalation Vulnerability (Server 2003) version 65 accepted 2011-05-16T04:03:00.570-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Dragos Prisaca organization Gideon Technologies, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." family windows id oval:org.mitre.oval:def:450 status accepted submitted 2004-12-21T12:00:00.000-04:00 title Windows Kernel LPC Privilege Escalation Vulnerability (32-bit XP,SP2) version 69
References
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18339
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1321
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1561
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1581
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1886
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2008
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4021
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4458
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A450