CERTA-2004-AVI-237

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité est présente dans l'Utility Manager de Windows 2000.

Description

Microsoft Windows 2000 possède des fonctionnalités permettant de simplifier l'utilisation du système d'exploitation (telle que Windows Narrator, un système de synthèse vocale) et pouvant être démarrées par l'Utility Manager.

Un utilisateur mal intentionné peut forcer Utility Manager à démarrer une application avec les privilèges SYSTEM afin de prendre le contrôle de la machine affectée.

Solution

Appliquer le correctif fourni par Microsoft (cf. Documentation).

Microsoft Windows 2000 Service Pack 2, 3 et 4.

Impacted products
Vendor Product Description
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eMicrosoft Windows 2000 Service Pack 2, 3 et 4.\u003c/P\u003e",
  "content": "## Description\n\nMicrosoft Windows 2000 poss\u00e8de des fonctionnalit\u00e9s permettant de\nsimplifier l\u0027utilisation du syst\u00e8me d\u0027exploitation (telle que Windows\nNarrator, un syst\u00e8me de synth\u00e8se vocale) et pouvant \u00eatre d\u00e9marr\u00e9es par\nl\u0027Utility Manager.\n\nUn utilisateur mal intentionn\u00e9 peut forcer Utility Manager \u00e0 d\u00e9marrer\nune application avec les privil\u00e8ges `SYSTEM` afin de prendre le contr\u00f4le\nde la machine affect\u00e9e.\n\n## Solution\n\nAppliquer le correctif fourni par Microsoft (cf. Documentation).\n",
  "cves": [],
  "links": [],
  "reference": "CERTA-2004-AVI-237",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-07-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 est pr\u00e9sente dans l\u0027Utility Manager de Windows 2000.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Utility Manager sous Windows",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS04-019",
      "url": "http://www.microsoft.com/technet/security/bulletin/MS04-019.mspx"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…