Microsoft Windows Virtual DOS Machine (VDM) contains null pointer dereference

ID VU:783748
Type cert
Reporter CERT
Modified 2004-04-14T00:00:00



Microsoft Windows NT4.0 and Windows 2000 contain a vulnerability that could permit a local user to gain elevated privileges on the system.


Microsoft Windows NT4.0 and Windows 2000 provide an Virtual DOS Machine (VDM) to support 16-bit legacy operations and applications. A vulnerability in the implementation of the VDM may lead to the dereferencing of a NULL pointer. This situation occurs when 16-bit code is executed without first initializing a VDM.

For more details, please see Microsoft Security Bulletin MS04-011 and eEye Digital Security Advisory [AD20040413E].


A local user may be able to gain elevated privileges on the system.


Apply a patch from the vendor

Microsoft Security Bulletin MS04-011 contains patch information to resolve this issue.

Systems Affected

Vendor| Status| Date Notified| Date Updated
Microsoft Corporation| | -| 14 Apr 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A


  • <>
  • <>


Thanks to Microsoft and eEye Digital Security for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

  • CVE IDs: CAN-2004-0118
  • Date Public: 13 Apr 2004
  • Date First Published: 14 Apr 2004
  • Date Last Updated: 14 Apr 2004
  • Severity Metric: 8.66
  • Document Revision: 2