René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

128 lines
3.9 KiB
JSON

{
"id": "CVE-2007-1209",
"sourceIdentifier": "secure@microsoft.com",
"published": "2007-04-10T21:19:00.000",
"lastModified": "2018-10-16T16:37:07.423",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Use-after-free vulnerability in the Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows Vista does not properly handle connection resources when starting and stopping processes, which allows local users to gain privileges by opening and closing multiple ApiPort connections, which leaves a \"dangling pointer\" to a process data structure."
},
{
"lang": "es",
"value": "Una vulnerabilidad de uso de la memoria previamente liberada en el subsistema Run-time cliente/servidor (CSRSS) en Microsoft Windows Vista, no maneja apropiadamente los recursos de conexi\u00f3n al iniciar y detener procesos, lo que permite a los usuarios locales alcanzar privilegios al abrir y cerrar m\u00faltiples conexiones de ApiPort, que deja un \"dangling pointer\" a una estructura de datos de proceso."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114"
}
]
}
]
}
],
"references": [
{
"url": "http://research.eeye.com/html/advisories/published/AD20070410b.html",
"source": "secure@microsoft.com"
},
{
"url": "http://securityreason.com/securityalert/2531",
"source": "secure@microsoft.com"
},
{
"url": "http://www.kb.cert.org/vuls/id/219848",
"source": "secure@microsoft.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/archive/1/465233/100/0/threaded",
"source": "secure@microsoft.com"
},
{
"url": "http://www.securityfocus.com/archive/1/466331/100/200/threaded",
"source": "secure@microsoft.com"
},
{
"url": "http://www.securityfocus.com/bid/23338",
"source": "secure@microsoft.com"
},
{
"url": "http://www.securitytracker.com/id?1017897",
"source": "secure@microsoft.com"
},
{
"url": "http://www.us-cert.gov/cas/techalerts/TA07-100A.html",
"source": "secure@microsoft.com",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.vupen.com/english/advisories/2007/1325",
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-021",
"source": "secure@microsoft.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1524",
"source": "secure@microsoft.com"
}
]
}