ID CVE-2002-0367
Summary smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
References
Vulnerable Configurations
  • Microsoft Windows 2000
    cpe:2.3:o:microsoft:windows_2000
  • Microsoft Windows NT 4.0
    cpe:2.3:o:microsoft:windows_nt:4.0
CVSS
Base: 7.2 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
description Microsoft Windows 2000 / NT 4.0 Process Handle Local Privilege Elevation Vulnerability. CVE-2002-0367. Local exploit for windows platform
id EDB-ID:21344
last seen 2016-02-02
modified 2002-03-13
published 2002-03-13
reporter EliCZ
source https://www.exploit-db.com/download/21344/
title Microsoft Windows 2000 / NT 4.0 - Process Handle Local Privilege Elevation Vulnerability
nessus via4
NASL family Windows : Microsoft Bulletins
NASL id SMB_NT_MS02-024.NASL
description The remote host contains a flaw in the Windows Debugger that could allow a local user to elevate his privileges. To exploit this vulnerability, a user needs to send a specially crafted code to the Debbuging handler to execute arbitrary code with SYSTEM privileges.
last seen 2019-02-21
modified 2018-11-15
plugin id 10964
published 2002-05-23
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=10964
title MS02-024: Windows Debugger flaw can Lead to Elevated Privileges (320206)
oval via4
  • accepted 2018-09-11T10:00:00.000-05:00
    class vulnerability
    contributors
    • name Tiffany Bergeron
      organization The MITRE Corporation
    • name Jonathan Baker
      organization The MITRE Corporation
    definition_extensions
    comment Microsoft Windows NT is installed
    oval oval:org.mitre.oval:def:36
    description smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
    family windows
    id oval:org.mitre.oval:def:158
    status accepted
    submitted 2003-04-04T12:00:00.000-04:00
    title Windows NT Process Handle Duplication Privilege Escalation
    version 67
  • accepted 2011-05-16T04:03:26.169-04:00
    class vulnerability
    contributors
    • name Tiffany Bergeron
      organization The MITRE Corporation
    • name Shane Shaffer
      organization G2, Inc.
    • name Sudhir Gandhe
      organization Telos
    • name Shane Shaffer
      organization G2, Inc.
    description smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
    family windows
    id oval:org.mitre.oval:def:76
    status accepted
    submitted 2003-04-04T12:00:00.000-04:00
    title Windows 2000 Process Handle Duplication Privilege Escalation
    version 68
refmap via4
bid 4287
bugtraq
  • 20020314 Fwd: DebPloit (exploit)
  • 20020326 Re: DebPloit (exploit)
  • 20020327 Local Security Vulnerability in Windows NT and Windows 2000
ms MS02-024
ntbugtraq 20020314 DebPloit (exploit)
xf win-debug-duplicate-handles(8462)
Last major update 17-10-2016 - 22:19
Published 25-06-2002 - 00:00
Last modified 12-10-2018 - 17:31
Back to Top