The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate parameters sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability."
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=122479227205998&w=2 | Mailing List Third Party Advisory |
http://secunia.com/advisories/32247 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/31652 | Patch Third Party Advisory VDB Entry |
http://www.securitytracker.com/id?1021046 | Third Party Advisory VDB Entry |
http://www.us-cert.gov/cas/techalerts/TA08-288A.html | Third Party Advisory US Government Resource |
http://www.vupen.com/english/advisories/2008/2812 | Broken Link |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45543 | VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45544 | VDB Entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6045 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2008-10-15 00:12
Updated : 2024-02-04 17:33
NVD link : CVE-2008-2252
Mitre link : CVE-2008-2252
CVE.ORG link : CVE-2008-2252
JSON object : View
Products Affected
microsoft
- windows_xp
- windows_server_2008
- windows_2000
- windows_vista
- windows_server_2003
CWE
CWE-264
Permissions, Privileges, and Access Controls