CVE-2008-5725 (GCVE-0-2008-5725)
Vulnerability from cvelistv5 – Published: 2008-12-26 17:08 – Updated: 2024-08-07 11:04
VLAI?
Summary
The NT kernel-mode driver (aka pstrip.sys) 5.0.1.1 and earlier in EnTech Taiwan PowerStrip 3.84 and earlier allows local users to gain privileges via certain IRP parameters in an IOCTL request to \Device\Powerstrip1 that overwrites portions of memory.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Date Public ?
2008-12-20 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:04:44.625Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "32961",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/32961"
},
{
"name": "33249",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33249"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.ntinternals.org/ntiadv0810/ntiadv0810.html"
},
{
"name": "4809",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/4809"
},
{
"name": "7533",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/7533"
},
{
"name": "powerstrip-pstrip-priv-escalation(47532)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47532"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-12-20T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The NT kernel-mode driver (aka pstrip.sys) 5.0.1.1 and earlier in EnTech Taiwan PowerStrip 3.84 and earlier allows local users to gain privileges via certain IRP parameters in an IOCTL request to \\Device\\Powerstrip1 that overwrites portions of memory."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "32961",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/32961"
},
{
"name": "33249",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33249"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.ntinternals.org/ntiadv0810/ntiadv0810.html"
},
{
"name": "4809",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/4809"
},
{
"name": "7533",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/7533"
},
{
"name": "powerstrip-pstrip-priv-escalation(47532)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47532"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-5725",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The NT kernel-mode driver (aka pstrip.sys) 5.0.1.1 and earlier in EnTech Taiwan PowerStrip 3.84 and earlier allows local users to gain privileges via certain IRP parameters in an IOCTL request to \\Device\\Powerstrip1 that overwrites portions of memory."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "32961",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32961"
},
{
"name": "33249",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33249"
},
{
"name": "http://www.ntinternals.org/ntiadv0810/ntiadv0810.html",
"refsource": "MISC",
"url": "http://www.ntinternals.org/ntiadv0810/ntiadv0810.html"
},
{
"name": "4809",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4809"
},
{
"name": "7533",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/7533"
},
{
"name": "powerstrip-pstrip-priv-escalation(47532)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47532"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-5725",
"datePublished": "2008-12-26T17:08:00.000Z",
"dateReserved": "2008-12-26T00:00:00.000Z",
"dateUpdated": "2024-08-07T11:04:44.625Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2008-5725",
"date": "2026-05-06",
"epss": "0.00293",
"percentile": "0.52554"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.84\", \"matchCriteriaId\": \"78FE35B0-3706-4496-AC3C-F8F7878D9856\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAA1435F-7466-4942-981B-31361374E939\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AE4399E-F4E1-4D53-90FB-C243369D6293\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8B8DF65-325A-49D2-9912-F1AD1ECE467F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5090A42F-40A0-47C4-A254-EB5ECA6C2509\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"282A32BA-7ABF-4676-9FD3-CC32D35F6B9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13D14840-195F-4025-A5A4-666B153BDE2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F544C0DF-81F2-4167-83AC-1105283FF29D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C25E753-8854-4528-A048-16B3D55E50EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD0BB87D-41F1-4827-BE71-B3C8F8C74AEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C7CEE7B-1CB2-4D9D-80AE-887588048D7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD3D08A4-CF00-40F8-A540-941D8D980DF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA98E762-62C1-43EB-88DF-30736B74A5F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FAFC7CC-03B2-4CB3-B779-9D2D792B5FE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CEFEEFD-BB9D-4750-9230-A10ADB8713F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6335D859-7261-444F-8393-8250E0625D6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FAED109-7C1B-4649-A425-4AE7C4676C4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62657BEA-E628-4B47-8C96-55A6E5130E1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF9057B8-2D4D-4FCB-9F61-A47DC41BED06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E786A8B1-62A0-43AF-9AAF-85FF65403D52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"499E1776-043C-41F4-B0E9-B9BFDF9511E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.47:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"197427A9-8A72-4D41-9017-D2BE1F963F00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.49:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E803A6B8-1ADA-4FB9-A9DE-E53A493F1F65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75B2B4B2-999B-4B09-9D0E-2B858EE7ABF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AE39306-14E6-4E82-9D4C-B54D11871E70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DC3B106-CAE7-4D75-9DA6-EA538D215BCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5210F125-318A-4977-B26D-96EAA9CA42D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6309C887-106D-488E-87E6-907E714F6265\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45AC8EE0-A390-4F25-90B0-4E8BBF9CC64C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06E08371-6DA8-42B9-B499-924084F5034D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9663FE3D-54B2-4A32-A6C5-409B91F848F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC58B3EC-6CA0-4FAF-9338-1B5EA25C59FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.59:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"512F5260-DB81-4D71-8AD2-10F61E316288\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED43EF6D-A0DC-4AF7-99D8-333E44B47B52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34A329F0-4879-4AA4-ADAE-A514CA4C6B9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E09C7983-DE2E-41B0-93F1-154F8015759A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.63:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A4C9ED6-7190-4579-92C4-B7488FA9BDDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.64:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"120A943F-3443-49A2-ADF8-3C38CD0B5E59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.65:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8A18669-28BC-4D20-AC2A-745AD947D4B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.70:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40512F60-DB77-47DC-A468-7EFF32F10B9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.72:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9987ED71-A973-4C2E-8773-E69F63CD1BBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.73:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E2CB50C-80CA-4195-9D8D-63E70E1706AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.74:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EE00FCF-3E4D-462B-BC96-E2CE51A571F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.75:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DD49643-8B73-4FC3-BBA9-1779E37759C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.76:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C7658ED-57E3-4F7B-9CCB-8BA27B57C5FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.77:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C5BBD32-CF44-4A44-A9B2-72B0771E287A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.78:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F2BC22-A1CA-4601-8317-DEE5EEB25B53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.80:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD1AA858-9FDB-4218-A316-59C50BF97E3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.81:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D962253-93B1-4D86-BF98-99EA9AA8BE4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.83:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ABA1282-2AD2-4474-908A-FD02759EA5AF\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The NT kernel-mode driver (aka pstrip.sys) 5.0.1.1 and earlier in EnTech Taiwan PowerStrip 3.84 and earlier allows local users to gain privileges via certain IRP parameters in an IOCTL request to \\\\Device\\\\Powerstrip1 that overwrites portions of memory.\"}, {\"lang\": \"es\", \"value\": \"El driver de NT kernel-mode (tambi\\u00e9n conocido como pstrip.sys) 5.0.1.1 y anteriores en EnTech Taiwan PowerStrip 3.84 y anteriores permite a usuarios locales obtener privilegios mediante ciertos par\\u00e1metros IRP en una petici\\u00f3n IOCTL a \\\\Device\\\\Powerstrip1 que sobrescribe porciones de memoria.\"}]",
"id": "CVE-2008-5725",
"lastModified": "2024-11-21T00:54:44.923",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2008-12-26T17:30:00.610",
"references": "[{\"url\": \"http://secunia.com/advisories/33249\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securityreason.com/securityalert/4809\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ntinternals.org/ntiadv0810/ntiadv0810.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.securityfocus.com/bid/32961\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/47532\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.exploit-db.com/exploits/7533\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/33249\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securityreason.com/securityalert/4809\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ntinternals.org/ntiadv0810/ntiadv0810.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.securityfocus.com/bid/32961\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/47532\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.exploit-db.com/exploits/7533\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2008-5725\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-12-26T17:30:00.610\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The NT kernel-mode driver (aka pstrip.sys) 5.0.1.1 and earlier in EnTech Taiwan PowerStrip 3.84 and earlier allows local users to gain privileges via certain IRP parameters in an IOCTL request to \\\\Device\\\\Powerstrip1 that overwrites portions of memory.\"},{\"lang\":\"es\",\"value\":\"El driver de NT kernel-mode (tambi\u00e9n conocido como pstrip.sys) 5.0.1.1 y anteriores en EnTech Taiwan PowerStrip 3.84 y anteriores permite a usuarios locales obtener privilegios mediante ciertos par\u00e1metros IRP en una petici\u00f3n IOCTL a \\\\Device\\\\Powerstrip1 que sobrescribe porciones de memoria.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.84\",\"matchCriteriaId\":\"78FE35B0-3706-4496-AC3C-F8F7878D9856\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAA1435F-7466-4942-981B-31361374E939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AE4399E-F4E1-4D53-90FB-C243369D6293\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B8DF65-325A-49D2-9912-F1AD1ECE467F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5090A42F-40A0-47C4-A254-EB5ECA6C2509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"282A32BA-7ABF-4676-9FD3-CC32D35F6B9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13D14840-195F-4025-A5A4-666B153BDE2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F544C0DF-81F2-4167-83AC-1105283FF29D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C25E753-8854-4528-A048-16B3D55E50EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD0BB87D-41F1-4827-BE71-B3C8F8C74AEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7CEE7B-1CB2-4D9D-80AE-887588048D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD3D08A4-CF00-40F8-A540-941D8D980DF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA98E762-62C1-43EB-88DF-30736B74A5F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FAFC7CC-03B2-4CB3-B779-9D2D792B5FE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CEFEEFD-BB9D-4750-9230-A10ADB8713F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6335D859-7261-444F-8393-8250E0625D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FAED109-7C1B-4649-A425-4AE7C4676C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62657BEA-E628-4B47-8C96-55A6E5130E1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF9057B8-2D4D-4FCB-9F61-A47DC41BED06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E786A8B1-62A0-43AF-9AAF-85FF65403D52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"499E1776-043C-41F4-B0E9-B9BFDF9511E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"197427A9-8A72-4D41-9017-D2BE1F963F00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E803A6B8-1ADA-4FB9-A9DE-E53A493F1F65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B2B4B2-999B-4B09-9D0E-2B858EE7ABF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AE39306-14E6-4E82-9D4C-B54D11871E70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DC3B106-CAE7-4D75-9DA6-EA538D215BCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5210F125-318A-4977-B26D-96EAA9CA42D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6309C887-106D-488E-87E6-907E714F6265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45AC8EE0-A390-4F25-90B0-4E8BBF9CC64C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06E08371-6DA8-42B9-B499-924084F5034D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9663FE3D-54B2-4A32-A6C5-409B91F848F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC58B3EC-6CA0-4FAF-9338-1B5EA25C59FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"512F5260-DB81-4D71-8AD2-10F61E316288\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED43EF6D-A0DC-4AF7-99D8-333E44B47B52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34A329F0-4879-4AA4-ADAE-A514CA4C6B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09C7983-DE2E-41B0-93F1-154F8015759A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A4C9ED6-7190-4579-92C4-B7488FA9BDDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"120A943F-3443-49A2-ADF8-3C38CD0B5E59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.65:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8A18669-28BC-4D20-AC2A-745AD947D4B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40512F60-DB77-47DC-A468-7EFF32F10B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9987ED71-A973-4C2E-8773-E69F63CD1BBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E2CB50C-80CA-4195-9D8D-63E70E1706AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE00FCF-3E4D-462B-BC96-E2CE51A571F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD49643-8B73-4FC3-BBA9-1779E37759C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.76:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C7658ED-57E3-4F7B-9CCB-8BA27B57C5FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.77:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C5BBD32-CF44-4A44-A9B2-72B0771E287A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.78:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F2BC22-A1CA-4601-8317-DEE5EEB25B53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD1AA858-9FDB-4218-A316-59C50BF97E3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D962253-93B1-4D86-BF98-99EA9AA8BE4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ABA1282-2AD2-4474-908A-FD02759EA5AF\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/33249\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/4809\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ntinternals.org/ntiadv0810/ntiadv0810.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/bid/32961\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/47532\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.exploit-db.com/exploits/7533\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/33249\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/4809\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ntinternals.org/ntiadv0810/ntiadv0810.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/bid/32961\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/47532\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/7533\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…