Show plain JSON{"id": "CVE-2007-5633", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2007-10-23T17:46:00.000", "references": [{"url": "http://osvdb.org/41842", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/27312", "source": "cve@mitre.org"}, {"url": "http://www.bugtrack.almico.com/view.php?id=987", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.reversemode.com/index.php?option=com_content&task=view&id=42&Itemid=1", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/26123", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37298", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/41842", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/27312", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.bugtrack.almico.com/view.php?id=987", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.reversemode.com/index.php?option=com_content&task=view&id=42&Itemid=1", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/26123", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37298", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Speedfan.sys in Alfredo Milani Comparetti SpeedFan 4.33, when used on Microsoft Windows Vista x64, allows local users to read or write arbitrary MSRs, and gain privileges and load unsigned drivers, via the (1) IOCTL_RDMSR 0x9C402438 and (2) IOCTL_WRMSR 0x9C40243C IOCTLs to \\Device\\speedfan, as demonstrated by an IOCTL_WRMSR action on MSR_LSTAR."}, {"lang": "es", "value": "Speedfan.sys en Alfredo Milani Comparetti SpeedFan 4.33, uando es utilizado sobre Microsoft Windows Vista x64, permite a usuarios locales leer o escribit MSRs de su elecci\u00f3n, y ganar privilegios y cargar controladores no asignados, a trav\u00e9s de (1) IOCTL_RDMSR 0x9C402438 y (2) IOCTL_WRMSR 0x9C40243C IOCTLs en \\Device\\speedfan, como se demostr\u00f3 por la acci\u00f3n IOCTL_WRMSR sobre MSR_LSTAR."}], "lastModified": "2024-11-21T00:38:21.337", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:almico:speedfan:4.33:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86F1246E-9247-4445-8DA8-09D6F6367B7C"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}