ID CVE-2005-1088
Summary Unknown vulnerability in DameWare NT Utilities 4.8 and earlier, and Mini Remote Control 4.8 and earlier, allows local users to gain additional rights.
References
Vulnerable Configurations
  • cpe:2.3:a:dameware_development:mini_remote_control:3.70:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:3.70:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:mini_remote_control:3.71:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:3.71:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:mini_remote_control:3.72:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:3.72:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:mini_remote_control:3.73:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:3.73:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:mini_remote_control:3.74:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:3.74:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:mini_remote_control:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:mini_remote_control:4.1:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:mini_remote_control:4.2:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:mini_remote_control:4.3:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:mini_remote_control:4.4:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:mini_remote_control:4.5:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:mini_remote_control:4.6:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:mini_remote_control:4.7:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:mini_remote_control:4.8:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:mini_remote_control:4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.0.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.0.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.21.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.21.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.41.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.41.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.42.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.42.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.43.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.43.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.44.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.44.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.45.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.45.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.46.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.46.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.48.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.48.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.49:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.49:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.50:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.50:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.51:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.51:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.60.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.60.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.61.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.61.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.62.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.62.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.63.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.63.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.64.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.64.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.65.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.65.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.66.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.66.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.67:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.67:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.68.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.68.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.69:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.69:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.70:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.70:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.71.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.71.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.72.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.72.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.73.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.73.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:3.74.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:3.74.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:4.1:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:4.2:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:4.3:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:4.4:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:4.5:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:4.6:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:4.7:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:dameware_development:nt_utilities:4.8:*:*:*:*:*:*:*
    cpe:2.3:a:dameware_development:nt_utilities:4.8:*:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 11-07-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 13023
confirm http://www.dameware.com/support/security/bulletin.asp?ID=SB5
osvdb 18732
sectrack 1013653
secunia 14829
xf dameware-elevated-privileges(19997)
Last major update 11-07-2017 - 01:32
Published 02-05-2005 - 04:00
Last modified 11-07-2017 - 01:32
Back to Top