Vulnerabilities > CVE-2008-4036 - Numeric Errors vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Integer overflow in Memory Manager in Microsoft Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows local users to gain privileges via a crafted application that triggers an erroneous decrement of a variable, related to validation of parameters for Virtual Address Descriptors (VADs) and a "memory allocation mapping error," aka "Virtual Address Descriptor Elevation of Privilege Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 16 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS08-064.NASL |
description | The remote host contains a version of the Windows kernel that is vulnerable to a security flaw that could allow a local user to elevate his privileges or to crash it (therefore causing a denial of service). |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 34409 |
published | 2008-10-15 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/34409 |
title | MS08-064: Microsoft Windows Virtual Address Descriptors (VAD) Local Privilege Escalation (956841) |
code |
|
Oval
accepted | 2011-11-14T04:00:26.330-05:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
description | Integer overflow in Memory Manager in Microsoft Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows local users to gain privileges via a crafted application that triggers an erroneous decrement of a variable, related to validation of parameters for Virtual Address Descriptors (VADs) and a "memory allocation mapping error," aka "Virtual Address Descriptor Elevation of Privilege Vulnerability." | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:5343 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2008-10-14T14:00:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
title | scriptor Elevation of Privilege Vulnerability (MS08-064) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 72 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 31675 CVE(CAN) ID: CVE-2008-4036 Microsoft Windows是微软发布的非常流行的操作系统。 Windows的内存管理器处理内存分配和虚拟地址描述符(VAD)的方式中存在一个整数溢出漏洞。如果通过认证的攻击者在受影响的系统上运行特制的程序,此漏洞可能允许权限提升。成功利用此漏洞的攻击者可以在受影响的系统上获得特权提升。攻击者随后可安装程序;查看、更改或删除数据;或者创建拥有完全管理权限的新帐户。 Microsoft Windows XP SP3 Microsoft Windows XP SP2 Microsoft Windows Vista SP1 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2003 SP2 Microsoft Windows Server 2003 SP1 Microsoft --------- Microsoft已经为此发布了一个安全公告(MS08-064)以及相应补丁: MS08-064:Vulnerability in Virtual Address Descriptor Manipulation Could Allow Elevation of Privilege (956841) 链接:<a href=http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx?pf=true target=_blank>http://www.microsoft.com/technet/security/Bulletin/MS08-064.mspx?pf=true</a> |
id | SSV:4243 |
last seen | 2017-11-19 |
modified | 2008-10-15 |
published | 2008-10-15 |
reporter | Root |
title | Microsoft Windows VAD本地权限提升漏洞(MS08-064) |
References
- http://www.securityfocus.com/bid/31675
- http://www.securitytracker.com/id?1021051
- http://secunia.com/advisories/32251
- http://www.us-cert.gov/cas/techalerts/TA08-288A.html
- http://marc.info/?l=bugtraq&m=122479227205998&w=2
- http://www.vupen.com/english/advisories/2008/2815
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45572
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45571
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5343
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-064