2024-12-08 03:06:42 +00:00

116 lines
3.9 KiB
JSON

{
"id": "CVE-2007-4969",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-09-19T01:17:00.000",
"lastModified": "2024-11-21T00:36:50.547",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Process Monitor 1.22 does not properly validate certain parameters to System Service Descriptor Table (SSDT) function handlers, which allows local users to cause a denial of service (crash) and possibly gain privileges via unspecified kernel SSDT hooks for Windows Native API functions including (1) NtCreateKey, (2) NtDeleteValueKey, (3) NtLoadKey, (4) NtOpenKey, (5) NtQueryValueKey, (6) NtSetValueKey, and (7) NtUnloadKey."
},
{
"lang": "es",
"value": "Process Monitor 1.22 no valida adecuadamente ciertos par\u00e1metros a los manejadores de funciones de Tablas de Descripci\u00f3n de Servicios del Sistema (SSDT), lo cual permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente obtener privilegios mediante ganchos SSDT del n\u00facleo para funciones de la API nativa de Windows entre las que se incluyen (1) NtCreateKey, (2) NtDeleteValueKey, (3) NtLoadKey, (4) NtOpenKey, (5) NtQueryValueKey, (6) NtSetValueKey, y (7) NtUnloadKey."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"baseScore": 4.4,
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sysinternals:process_monitor:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "E323A84E-A775-49A1-B262-0D7FB0CF25ED"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/45953",
"source": "cve@mitre.org"
},
{
"url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/25719",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/45953",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.matousec.com/info/advisories/plague-in-security-software-drivers.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.matousec.com/projects/windows-personal-firewall-analysis/plague-in-security-software-drivers.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/479830/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/25719",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}