2024-11-22 07:15:30 +00:00

115 lines
3.9 KiB
JSON

{
"id": "CVE-2007-4970",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-09-19T01:17:00.000",
"lastModified": "2024-11-21T00:36:50.700",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "ProcessGuard 3.410 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via kernel SSDT hooks for Windows Native API functions including (1) NtCreateFile, (2) NtCreateKey, (3) NtDeleteValueKey, (4) NtOpenFile, (5) NtOpenKey, and (6) NtSetValueKey."
},
{
"lang": "es",
"value": "ProcessGuard 3.410 no valida adecuadamente ciertos par\u00e1metros a los manejadores de funciones de Tablas de Descripci\u00f3n de Servicios del Sistema (SSDT), lo cual permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente obtener privilegios mediante ganchos SSDT del n\u00facleo para funciones de la API nativa de Windows entre las que se incluyen (1) NtCreateFile, (2) NtCreateKey, (3) NtDeleteValueKey, (4) NtOpenFile, (5) NtOpenKey, y (6) NtSetValueKey."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 4.4,
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:diamondcs:processguard:3.410:*:*:*:*:*:*:*",
"matchCriteriaId": "B2820834-A151-4FE4-A2AF-485766777D0A"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/45954",
"source": "cve@mitre.org"
},
{
"url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/25714",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/45954",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/25714",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}