Vulnerability Description
Microsoft Windows 2000, XP, and possibly 2003 allows local users with the SeDebugPrivilege privilege to execute arbitrary code as kernel and read or write kernel memory via the NtSystemDebugControl function, which does not verify its pointer arguments. Note: this issue has been disputed, since Administrator privileges are typically required to exploit this issue, thus privilege boundaries are not crossed
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 2000 | All versions |
| Microsoft | Windows 2003 Server | r2 |
| Microsoft | Windows Xp | All versions |
References
- http://archives.neohapsis.com/archives/bugtraq/2004-02/0529.html
- http://archives.neohapsis.com/archives/bugtraq/2004-02/0530.html
- http://www.securityfocus.com/archive/1/354392Vendor Advisory
- http://www.securitytracker.com/id?1009128
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15263
- http://archives.neohapsis.com/archives/bugtraq/2004-02/0529.html
- http://archives.neohapsis.com/archives/bugtraq/2004-02/0530.html
- http://www.securityfocus.com/archive/1/354392Vendor Advisory
- http://www.securitytracker.com/id?1009128
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15263
FAQ
What is CVE-2004-2339?
CVE-2004-2339 is a vulnerability with a CVSS score of 8.4 (HIGH). Microsoft Windows 2000, XP, and possibly 2003 allows local users with the SeDebugPrivilege privilege to execute arbitrary code as kernel and read or write kernel memory via the NtSystemDebugControl fu...
How severe is CVE-2004-2339?
CVE-2004-2339 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-2339?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 2000, Microsoft Windows 2003 Server, Microsoft Windows Xp.