The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate parameters sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability."
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/31652 | Patch Third Party Advisory VDB Entry |
http://secunia.com/advisories/32247 | Patch Vendor Advisory |
http://www.securitytracker.com/id?1021046 | Third Party Advisory VDB Entry |
http://marc.info/?l=bugtraq&m=122479227205998&w=2 | Mailing List Third Party Advisory |
http://www.us-cert.gov/cas/techalerts/TA08-288A.html | Third Party Advisory US Government Resource |
http://www.vupen.com/english/advisories/2008/2812 | Broken Link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45544 | VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45543 | VDB Entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6045 | Third Party Advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-061 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2008-10-14 17:12
Updated : 2019-10-09 15:55
NVD link : CVE-2008-2252
Mitre link : CVE-2008-2252
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
microsoft
- windows_vista
- windows_xp
- windows_server_2008
- windows_server_2003
- windows_2000