Microsoft Virtual DOS Machine Local Privilege Escalation Vulnerability
2004-04-13T00:00:00
ID SMNTC-10117 Type symantec Reporter Symantec Security Response Modified 2004-04-13T00:00:00
Description
Description
A problem exists in the Virtual DOS Machine (VDM) that may allow a local user to elevate their privilege level. The issue exists because an attacker may use the VDM to write arbitrary code to protected kernel memory locations.
Technologies Affected
Avaya DefinityOne Media Servers
Avaya IP600 Media Servers
Avaya S3400 Message Application Server
Avaya S8100 Media Servers
Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Advanced Server SP1
Microsoft Windows 2000 Advanced Server SP2
Microsoft Windows 2000 Advanced Server SP3
Microsoft Windows 2000 Advanced Server SP4
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Datacenter Server SP1
Microsoft Windows 2000 Datacenter Server SP2
Microsoft Windows 2000 Datacenter Server SP3
Microsoft Windows 2000 Datacenter Server SP4
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Professional SP1
Microsoft Windows 2000 Professional SP2
Microsoft Windows 2000 Professional SP3
Microsoft Windows 2000 Professional SP4
Microsoft Windows 2000 Server
Microsoft Windows 2000 Server SP1
Microsoft Windows 2000 Server SP2
Microsoft Windows 2000 Server SP3
Microsoft Windows 2000 Server SP4
Microsoft Windows NT Enterprise Server 4.0
Microsoft Windows NT Enterprise Server 4.0 SP1
Microsoft Windows NT Enterprise Server 4.0 SP2
Microsoft Windows NT Enterprise Server 4.0 SP3
Microsoft Windows NT Enterprise Server 4.0 SP4
Microsoft Windows NT Enterprise Server 4.0 SP5
Microsoft Windows NT Enterprise Server 4.0 SP6
Microsoft Windows NT Enterprise Server 4.0 SP6a
Microsoft Windows NT Server 4.0
Microsoft Windows NT Server 4.0 SP1
Microsoft Windows NT Server 4.0 SP2
Microsoft Windows NT Server 4.0 SP3
Microsoft Windows NT Server 4.0 SP4
Microsoft Windows NT Server 4.0 SP5
Microsoft Windows NT Server 4.0 SP6
Microsoft Windows NT Server 4.0 SP6a
Microsoft Windows NT Terminal Server 4.0
Microsoft Windows NT Terminal Server 4.0 SP1
Microsoft Windows NT Terminal Server 4.0 SP2
Microsoft Windows NT Terminal Server 4.0 SP3
Microsoft Windows NT Terminal Server 4.0 SP4
Microsoft Windows NT Terminal Server 4.0 SP5
Microsoft Windows NT Terminal Server 4.0 SP6
Microsoft Windows NT Workstation 4.0
Microsoft Windows NT Workstation 4.0 SP1
Microsoft Windows NT Workstation 4.0 SP2
Microsoft Windows NT Workstation 4.0 SP3
Microsoft Windows NT Workstation 4.0 SP4
Microsoft Windows NT Workstation 4.0 SP5
Microsoft Windows NT Workstation 4.0 SP6
Microsoft Windows NT Workstation 4.0 SP6a
Recommendations
Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
This vulnerability could only be exploited by a local user. Local access to critical systems should only be permitted for trusted users.
Avaya has released an advisory to announce that Avaya System Products shipping on Microsoft platforms are also affected by this vulnerability. Avaya advise that customers follow the Microsoft recommendations for the resolution of this issue. The aforementioned advisory can be viewed at the following location: http://support.avaya.com/japple/css/japple?temp.groupID=&temp.selectedFamily=128451&temp.selectedProduct=154235&temp.selectedBucket=126655&temp.feedbackState=askForFeedback&temp.documentID=161384&PAGE=avaya.css.CSSLvl1Detail&executeTransaction=avaya.css.UsageUpdate() Microsoft has released fixes. US-CERT has released an advisory TA04-104A to address this and other issues. Please see the referenced advisory for more information. June 15, 2004 - Microsoft has updated security bulletin MS04-011 to release a Windows NT 4.0 Workstation update for the Pan Chinese language. The Pan Chinese update should be installed by customers who installed Windows NT 4.0 Workstation for Pan Chinese update or who use the Pan Chinese product.
{"id": "SMNTC-10117", "type": "symantec", "bulletinFamily": "software", "title": "Microsoft Virtual DOS Machine Local Privilege Escalation Vulnerability", "description": "### Description\n\nA problem exists in the Virtual DOS Machine (VDM) that may allow a local user to elevate their privilege level. The issue exists because an attacker may use the VDM to write arbitrary code to protected kernel memory locations.\n\n### Technologies Affected\n\n * Avaya DefinityOne Media Servers \n * Avaya IP600 Media Servers \n * Avaya S3400 Message Application Server \n * Avaya S8100 Media Servers \n * Microsoft Windows 2000 Advanced Server \n * Microsoft Windows 2000 Advanced Server SP1 \n * Microsoft Windows 2000 Advanced Server SP2 \n * Microsoft Windows 2000 Advanced Server SP3 \n * Microsoft Windows 2000 Advanced Server SP4 \n * Microsoft Windows 2000 Datacenter Server \n * Microsoft Windows 2000 Datacenter Server SP1 \n * Microsoft Windows 2000 Datacenter Server SP2 \n * Microsoft Windows 2000 Datacenter Server SP3 \n * Microsoft Windows 2000 Datacenter Server SP4 \n * Microsoft Windows 2000 Professional \n * Microsoft Windows 2000 Professional SP1 \n * Microsoft Windows 2000 Professional SP2 \n * Microsoft Windows 2000 Professional SP3 \n * Microsoft Windows 2000 Professional SP4 \n * Microsoft Windows 2000 Server \n * Microsoft Windows 2000 Server SP1 \n * Microsoft Windows 2000 Server SP2 \n * Microsoft Windows 2000 Server SP3 \n * Microsoft Windows 2000 Server SP4 \n * Microsoft Windows NT Enterprise Server 4.0 \n * Microsoft Windows NT Enterprise Server 4.0 SP1 \n * Microsoft Windows NT Enterprise Server 4.0 SP2 \n * Microsoft Windows NT Enterprise Server 4.0 SP3 \n * Microsoft Windows NT Enterprise Server 4.0 SP4 \n * Microsoft Windows NT Enterprise Server 4.0 SP5 \n * Microsoft Windows NT Enterprise Server 4.0 SP6 \n * Microsoft Windows NT Enterprise Server 4.0 SP6a \n * Microsoft Windows NT Server 4.0 \n * Microsoft Windows NT Server 4.0 SP1 \n * Microsoft Windows NT Server 4.0 SP2 \n * Microsoft Windows NT Server 4.0 SP3 \n * Microsoft Windows NT Server 4.0 SP4 \n * Microsoft Windows NT Server 4.0 SP5 \n * Microsoft Windows NT Server 4.0 SP6 \n * Microsoft Windows NT Server 4.0 SP6a \n * Microsoft Windows NT Terminal Server 4.0 \n * Microsoft Windows NT Terminal Server 4.0 SP1 \n * Microsoft Windows NT Terminal Server 4.0 SP2 \n * Microsoft Windows NT Terminal Server 4.0 SP3 \n * Microsoft Windows NT Terminal Server 4.0 SP4 \n * Microsoft Windows NT Terminal Server 4.0 SP5 \n * Microsoft Windows NT Terminal Server 4.0 SP6 \n * Microsoft Windows NT Workstation 4.0 \n * Microsoft Windows NT Workstation 4.0 SP1 \n * Microsoft Windows NT Workstation 4.0 SP2 \n * Microsoft Windows NT Workstation 4.0 SP3 \n * Microsoft Windows NT Workstation 4.0 SP4 \n * Microsoft Windows NT Workstation 4.0 SP5 \n * Microsoft Windows NT Workstation 4.0 SP6 \n * Microsoft Windows NT Workstation 4.0 SP6a \n\n### Recommendations\n\n**Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.** \nThis vulnerability could only be exploited by a local user. Local access to critical systems should only be permitted for trusted users.\n\nAvaya has released an advisory to announce that Avaya System Products shipping on Microsoft platforms are also affected by this vulnerability. Avaya advise that customers follow the Microsoft recommendations for the resolution of this issue. The aforementioned advisory can be viewed at the following location: http://support.avaya.com/japple/css/japple?temp.groupID=&temp.selectedFamily=128451&temp.selectedProduct=154235&temp.selectedBucket=126655&temp.feedbackState=askForFeedback&temp.documentID=161384&PAGE=avaya.css.CSSLvl1Detail&executeTransaction=avaya.css.UsageUpdate() Microsoft has released fixes. US-CERT has released an advisory TA04-104A to address this and other issues. Please see the referenced advisory for more information. June 15, 2004 - Microsoft has updated security bulletin MS04-011 to release a Windows NT 4.0 Workstation update for the Pan Chinese language. The Pan Chinese update should be installed by customers who installed Windows NT 4.0 Workstation for Pan Chinese update or who use the Pan Chinese product.\n", "published": "2004-04-13T00:00:00", "modified": "2004-04-13T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/10117", "reporter": "Symantec Security Response", "references": ["http://www.eeye.com/html/Research/Advisories/AD20040413E.html", "http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx"], "cvelist": [], "lastseen": "2018-03-13T06:16:30", "viewCount": 0, "enchantments": {"score": {"value": -0.5, "vector": "NONE", "modified": "2018-03-13T06:16:30", "rev": 2}, "dependencies": {"references": [], "modified": "2018-03-13T06:16:30", "rev": 2}, "vulnersScore": -0.5}, "affectedSoftware": [{"version": "2000 Datacenter Server ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "2000 Advanced Server ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "4.0 SP2 ", "name": "Microsoft Windows NT Terminal Server", "operator": "eq"}, {"version": "4.0 SP3 ", "name": "Microsoft Windows NT Terminal Server", "operator": "eq"}, {"version": "4.0 SP5 ", "name": "Microsoft Windows NT Workstation", "operator": "eq"}, {"version": "4.0 SP4 ", "name": "Microsoft Windows NT Enterprise Server", "operator": "eq"}, {"version": "4.0 SP4 ", "name": "Microsoft Windows NT Server", "operator": "eq"}, {"version": "4.0 SP2 ", "name": "Microsoft Windows NT Server", "operator": "eq"}, {"version": "2000 Server SP1 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "2000 Datacenter Server SP3 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "4.0 SP6 ", "name": "Microsoft Windows NT Terminal Server", "operator": "eq"}, {"version": "2000 Datacenter Server SP4 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "2000 Advanced Server SP2 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "4.0 SP6 ", "name": "Microsoft Windows NT Workstation", "operator": "eq"}, {"version": "2000 Server SP4 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "2000 Professional ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "2000 Server SP3 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "4.0 SP4 ", "name": "Microsoft Windows NT Workstation", "operator": "eq"}, {"version": "2000 Professional SP4 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "4.0 ", "name": "Microsoft Windows NT Workstation", "operator": "eq"}, {"version": "4.0 SP2 ", "name": "Microsoft Windows NT Workstation", "operator": "eq"}, {"version": "4.0 SP4 ", "name": "Microsoft Windows NT Terminal Server", "operator": "eq"}, {"version": "4.0 SP5 ", "name": "Microsoft Windows NT Terminal Server", "operator": "eq"}, {"version": "2000 Advanced Server SP4 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "2000 Datacenter Server SP1 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "4.0 SP5 ", "name": "Microsoft Windows NT Server", "operator": "eq"}, {"version": "2000 Server SP2 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "4.0 ", "name": "Microsoft Windows NT Server", "operator": "eq"}, {"version": "4.0 SP5 ", "name": "Microsoft Windows NT Enterprise Server", "operator": "eq"}, {"version": "4.0 ", "name": "Microsoft Windows NT Enterprise Server", "operator": "eq"}, {"version": "4.0 SP6a ", "name": "Microsoft Windows NT Server", "operator": "eq"}, {"version": "2000 Advanced Server SP3 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "4.0 SP3 ", "name": "Microsoft Windows NT Server", "operator": "eq"}, {"version": "4.0 SP3 ", "name": "Microsoft Windows NT Workstation", "operator": "eq"}, {"version": "4.0 SP6a ", "name": "Microsoft Windows NT Enterprise Server", "operator": "eq"}, {"version": "4.0 SP2 ", "name": "Microsoft Windows NT Enterprise Server", "operator": "eq"}, {"version": "2000 Advanced Server SP1 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "4.0 SP6 ", "name": "Microsoft Windows NT Enterprise Server", "operator": "eq"}, {"version": "2000 Professional SP2 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "4.0 ", "name": "Microsoft Windows NT Terminal Server", "operator": "eq"}, {"version": "2000 Professional SP1 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "2000 Datacenter Server SP2 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "2000 Professional SP3 ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "4.0 SP6a ", "name": "Microsoft Windows NT Workstation", "operator": "eq"}, {"version": "2000 Server ", "name": "Microsoft Windows", "operator": "eq"}, {"version": "4.0 SP1 ", "name": "Microsoft Windows NT Workstation", "operator": "eq"}, {"version": "4.0 SP1 ", "name": "Microsoft Windows NT Enterprise Server", "operator": "eq"}, {"version": "4.0 SP6 ", "name": "Microsoft Windows NT Server", "operator": "eq"}, {"version": "4.0 SP3 ", "name": "Microsoft Windows NT Enterprise Server", "operator": "eq"}, {"version": "4.0 SP1 ", "name": "Microsoft Windows NT Terminal Server", "operator": "eq"}, {"version": "4.0 SP1 ", "name": "Microsoft Windows NT Server", "operator": "eq"}], "immutableFields": []}