CVE-2008-5725 (GCVE-0-2008-5725)

Vulnerability from cvelistv5 – Published: 2008-12-26 17:08 – Updated: 2024-08-07 11:04
VLAI?
Summary
The NT kernel-mode driver (aka pstrip.sys) 5.0.1.1 and earlier in EnTech Taiwan PowerStrip 3.84 and earlier allows local users to gain privileges via certain IRP parameters in an IOCTL request to \Device\Powerstrip1 that overwrites portions of memory.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/32961 vdb-entryx_refsource_BID
http://secunia.com/advisories/33249 third-party-advisoryx_refsource_SECUNIA
http://www.ntinternals.org/ntiadv0810/ntiadv0810.html x_refsource_MISC
http://securityreason.com/securityalert/4809 third-party-advisoryx_refsource_SREASON
https://www.exploit-db.com/exploits/7533 exploitx_refsource_EXPLOIT-DB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Date Public ?
2008-12-20 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:04:44.625Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "32961",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32961"
          },
          {
            "name": "33249",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33249"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.ntinternals.org/ntiadv0810/ntiadv0810.html"
          },
          {
            "name": "4809",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4809"
          },
          {
            "name": "7533",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/7533"
          },
          {
            "name": "powerstrip-pstrip-priv-escalation(47532)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47532"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-20T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The NT kernel-mode driver (aka pstrip.sys) 5.0.1.1 and earlier in EnTech Taiwan PowerStrip 3.84 and earlier allows local users to gain privileges via certain IRP parameters in an IOCTL request to \\Device\\Powerstrip1 that overwrites portions of memory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "32961",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32961"
        },
        {
          "name": "33249",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33249"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.ntinternals.org/ntiadv0810/ntiadv0810.html"
        },
        {
          "name": "4809",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4809"
        },
        {
          "name": "7533",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/7533"
        },
        {
          "name": "powerstrip-pstrip-priv-escalation(47532)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47532"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5725",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The NT kernel-mode driver (aka pstrip.sys) 5.0.1.1 and earlier in EnTech Taiwan PowerStrip 3.84 and earlier allows local users to gain privileges via certain IRP parameters in an IOCTL request to \\Device\\Powerstrip1 that overwrites portions of memory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "32961",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32961"
            },
            {
              "name": "33249",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33249"
            },
            {
              "name": "http://www.ntinternals.org/ntiadv0810/ntiadv0810.html",
              "refsource": "MISC",
              "url": "http://www.ntinternals.org/ntiadv0810/ntiadv0810.html"
            },
            {
              "name": "4809",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4809"
            },
            {
              "name": "7533",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/7533"
            },
            {
              "name": "powerstrip-pstrip-priv-escalation(47532)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47532"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5725",
    "datePublished": "2008-12-26T17:08:00.000Z",
    "dateReserved": "2008-12-26T00:00:00.000Z",
    "dateUpdated": "2024-08-07T11:04:44.625Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2008-5725",
      "date": "2026-05-06",
      "epss": "0.00293",
      "percentile": "0.52554"
    },
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.84\", \"matchCriteriaId\": \"78FE35B0-3706-4496-AC3C-F8F7878D9856\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAA1435F-7466-4942-981B-31361374E939\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AE4399E-F4E1-4D53-90FB-C243369D6293\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8B8DF65-325A-49D2-9912-F1AD1ECE467F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5090A42F-40A0-47C4-A254-EB5ECA6C2509\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"282A32BA-7ABF-4676-9FD3-CC32D35F6B9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13D14840-195F-4025-A5A4-666B153BDE2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F544C0DF-81F2-4167-83AC-1105283FF29D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C25E753-8854-4528-A048-16B3D55E50EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD0BB87D-41F1-4827-BE71-B3C8F8C74AEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C7CEE7B-1CB2-4D9D-80AE-887588048D7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD3D08A4-CF00-40F8-A540-941D8D980DF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA98E762-62C1-43EB-88DF-30736B74A5F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FAFC7CC-03B2-4CB3-B779-9D2D792B5FE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CEFEEFD-BB9D-4750-9230-A10ADB8713F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6335D859-7261-444F-8393-8250E0625D6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FAED109-7C1B-4649-A425-4AE7C4676C4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62657BEA-E628-4B47-8C96-55A6E5130E1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF9057B8-2D4D-4FCB-9F61-A47DC41BED06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E786A8B1-62A0-43AF-9AAF-85FF65403D52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"499E1776-043C-41F4-B0E9-B9BFDF9511E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.47:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"197427A9-8A72-4D41-9017-D2BE1F963F00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.49:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E803A6B8-1ADA-4FB9-A9DE-E53A493F1F65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75B2B4B2-999B-4B09-9D0E-2B858EE7ABF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AE39306-14E6-4E82-9D4C-B54D11871E70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DC3B106-CAE7-4D75-9DA6-EA538D215BCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5210F125-318A-4977-B26D-96EAA9CA42D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6309C887-106D-488E-87E6-907E714F6265\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45AC8EE0-A390-4F25-90B0-4E8BBF9CC64C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06E08371-6DA8-42B9-B499-924084F5034D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9663FE3D-54B2-4A32-A6C5-409B91F848F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC58B3EC-6CA0-4FAF-9338-1B5EA25C59FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.59:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"512F5260-DB81-4D71-8AD2-10F61E316288\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED43EF6D-A0DC-4AF7-99D8-333E44B47B52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34A329F0-4879-4AA4-ADAE-A514CA4C6B9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E09C7983-DE2E-41B0-93F1-154F8015759A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.63:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A4C9ED6-7190-4579-92C4-B7488FA9BDDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.64:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"120A943F-3443-49A2-ADF8-3C38CD0B5E59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.65:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8A18669-28BC-4D20-AC2A-745AD947D4B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.70:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40512F60-DB77-47DC-A468-7EFF32F10B9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.72:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9987ED71-A973-4C2E-8773-E69F63CD1BBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.73:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E2CB50C-80CA-4195-9D8D-63E70E1706AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.74:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EE00FCF-3E4D-462B-BC96-E2CE51A571F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.75:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DD49643-8B73-4FC3-BBA9-1779E37759C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.76:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C7658ED-57E3-4F7B-9CCB-8BA27B57C5FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.77:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C5BBD32-CF44-4A44-A9B2-72B0771E287A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.78:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F2BC22-A1CA-4601-8317-DEE5EEB25B53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.80:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD1AA858-9FDB-4218-A316-59C50BF97E3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.81:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D962253-93B1-4D86-BF98-99EA9AA8BE4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:entechtaiwan:powerstrip:3.83:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1ABA1282-2AD2-4474-908A-FD02759EA5AF\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The NT kernel-mode driver (aka pstrip.sys) 5.0.1.1 and earlier in EnTech Taiwan PowerStrip 3.84 and earlier allows local users to gain privileges via certain IRP parameters in an IOCTL request to \\\\Device\\\\Powerstrip1 that overwrites portions of memory.\"}, {\"lang\": \"es\", \"value\": \"El driver de NT kernel-mode (tambi\\u00e9n conocido como pstrip.sys) 5.0.1.1 y anteriores en EnTech Taiwan PowerStrip 3.84 y anteriores permite a usuarios locales obtener privilegios mediante ciertos par\\u00e1metros IRP en una petici\\u00f3n IOCTL a \\\\Device\\\\Powerstrip1 que sobrescribe porciones de memoria.\"}]",
      "id": "CVE-2008-5725",
      "lastModified": "2024-11-21T00:54:44.923",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2008-12-26T17:30:00.610",
      "references": "[{\"url\": \"http://secunia.com/advisories/33249\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securityreason.com/securityalert/4809\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ntinternals.org/ntiadv0810/ntiadv0810.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.securityfocus.com/bid/32961\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/47532\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.exploit-db.com/exploits/7533\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/33249\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securityreason.com/securityalert/4809\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ntinternals.org/ntiadv0810/ntiadv0810.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.securityfocus.com/bid/32961\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/47532\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.exploit-db.com/exploits/7533\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2008-5725\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-12-26T17:30:00.610\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The NT kernel-mode driver (aka pstrip.sys) 5.0.1.1 and earlier in EnTech Taiwan PowerStrip 3.84 and earlier allows local users to gain privileges via certain IRP parameters in an IOCTL request to \\\\Device\\\\Powerstrip1 that overwrites portions of memory.\"},{\"lang\":\"es\",\"value\":\"El driver de NT kernel-mode (tambi\u00e9n conocido como pstrip.sys) 5.0.1.1 y anteriores en EnTech Taiwan PowerStrip 3.84 y anteriores permite a usuarios locales obtener privilegios mediante ciertos par\u00e1metros IRP en una petici\u00f3n IOCTL a \\\\Device\\\\Powerstrip1 que sobrescribe porciones de memoria.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.84\",\"matchCriteriaId\":\"78FE35B0-3706-4496-AC3C-F8F7878D9856\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAA1435F-7466-4942-981B-31361374E939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AE4399E-F4E1-4D53-90FB-C243369D6293\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B8DF65-325A-49D2-9912-F1AD1ECE467F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5090A42F-40A0-47C4-A254-EB5ECA6C2509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"282A32BA-7ABF-4676-9FD3-CC32D35F6B9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13D14840-195F-4025-A5A4-666B153BDE2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F544C0DF-81F2-4167-83AC-1105283FF29D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C25E753-8854-4528-A048-16B3D55E50EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD0BB87D-41F1-4827-BE71-B3C8F8C74AEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7CEE7B-1CB2-4D9D-80AE-887588048D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD3D08A4-CF00-40F8-A540-941D8D980DF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA98E762-62C1-43EB-88DF-30736B74A5F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FAFC7CC-03B2-4CB3-B779-9D2D792B5FE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CEFEEFD-BB9D-4750-9230-A10ADB8713F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6335D859-7261-444F-8393-8250E0625D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FAED109-7C1B-4649-A425-4AE7C4676C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62657BEA-E628-4B47-8C96-55A6E5130E1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF9057B8-2D4D-4FCB-9F61-A47DC41BED06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E786A8B1-62A0-43AF-9AAF-85FF65403D52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"499E1776-043C-41F4-B0E9-B9BFDF9511E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"197427A9-8A72-4D41-9017-D2BE1F963F00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E803A6B8-1ADA-4FB9-A9DE-E53A493F1F65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B2B4B2-999B-4B09-9D0E-2B858EE7ABF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AE39306-14E6-4E82-9D4C-B54D11871E70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DC3B106-CAE7-4D75-9DA6-EA538D215BCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5210F125-318A-4977-B26D-96EAA9CA42D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6309C887-106D-488E-87E6-907E714F6265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45AC8EE0-A390-4F25-90B0-4E8BBF9CC64C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06E08371-6DA8-42B9-B499-924084F5034D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9663FE3D-54B2-4A32-A6C5-409B91F848F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC58B3EC-6CA0-4FAF-9338-1B5EA25C59FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"512F5260-DB81-4D71-8AD2-10F61E316288\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED43EF6D-A0DC-4AF7-99D8-333E44B47B52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34A329F0-4879-4AA4-ADAE-A514CA4C6B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09C7983-DE2E-41B0-93F1-154F8015759A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A4C9ED6-7190-4579-92C4-B7488FA9BDDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"120A943F-3443-49A2-ADF8-3C38CD0B5E59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.65:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8A18669-28BC-4D20-AC2A-745AD947D4B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40512F60-DB77-47DC-A468-7EFF32F10B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9987ED71-A973-4C2E-8773-E69F63CD1BBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E2CB50C-80CA-4195-9D8D-63E70E1706AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE00FCF-3E4D-462B-BC96-E2CE51A571F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD49643-8B73-4FC3-BBA9-1779E37759C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.76:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C7658ED-57E3-4F7B-9CCB-8BA27B57C5FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.77:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C5BBD32-CF44-4A44-A9B2-72B0771E287A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.78:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F2BC22-A1CA-4601-8317-DEE5EEB25B53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD1AA858-9FDB-4218-A316-59C50BF97E3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D962253-93B1-4D86-BF98-99EA9AA8BE4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:entechtaiwan:powerstrip:3.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ABA1282-2AD2-4474-908A-FD02759EA5AF\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/33249\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/4809\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ntinternals.org/ntiadv0810/ntiadv0810.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/bid/32961\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/47532\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.exploit-db.com/exploits/7533\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/33249\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/4809\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ntinternals.org/ntiadv0810/ntiadv0810.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/bid/32961\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/47532\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/7533\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…