lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: paa-listas at argentina.com (Pablo)
Subject: EEYE: Windows VDM #UD Local Privilege Escalation

----- Original Message ----- 
> Windows VDM #UD Local Privilege Escalation
>
> Release Date:
> October 12, 2004
>
> Date Reported:
> March 18, 2004
>
> Severity:
> Medium (Local Privilege Escalation to Kernel)
>
> Systems Affected:
> Windows NT 4.0
> Windows 2000
> Windows XP (SP1 and earlier)
> Windows Server 2003
...
>
> [NOTE: This vulnerability was silently fixed by Microsoft in June,
> approximately 90 days after it was reported, with the release of Windows
> XP SP2 Release Candidate 2.  All other versions of Windows remained
> unpatched for over 120 additional days.]
Ok, thanks for your help, but it come up "120 additional days" later ....
full-disclosure man.

Peace.

>
> Technical Description:
....
> Copyright (c) 1998-2004 eEye Digital Security
> Permission is hereby granted for the redistribution of this alert
> electronically. It is not to be edited in any way without express
> consent of eEye. If you wish to reprint the whole or any part of this
> alert in any other medium excluding electronic medium, please e-mail
> alert@...e.com for permission.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ