CVE-2003-0910

The NtSetLdtEntries function in the programming interface for the Local Descriptor Table (LDT) in Windows NT 4.0 and Windows 2000 allows local attackers to gain access to kernel memory and execute arbitrary code via an expand-down data segment descriptor descriptor that points to protected memory.
References
Link Resource
http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020068.html
http://www.ciac.org/ciac/bulletins/o-114.shtml
http://www.eeye.com/html/Research/Advisories/AD20040413D.html Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/122076 Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/10122
http://www.us-cert.gov/cas/techalerts/TA04-104A.html Third Party Advisory US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011
https://exchange.xforce.ibmcloud.com/vulnerabilities/15707
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A890
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A911
http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020068.html
http://www.ciac.org/ciac/bulletins/o-114.shtml
http://www.eeye.com/html/Research/Advisories/AD20040413D.html Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/122076 Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/10122
http://www.us-cert.gov/cas/techalerts/TA04-104A.html Third Party Advisory US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011
https://exchange.xforce.ibmcloud.com/vulnerabilities/15707
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A890
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A911
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:45

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020068.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020068.html -
References () http://www.ciac.org/ciac/bulletins/o-114.shtml - () http://www.ciac.org/ciac/bulletins/o-114.shtml -
References () http://www.eeye.com/html/Research/Advisories/AD20040413D.html - Patch, Vendor Advisory () http://www.eeye.com/html/Research/Advisories/AD20040413D.html - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/122076 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/122076 - Patch, Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/10122 - () http://www.securityfocus.com/bid/10122 -
References () http://www.us-cert.gov/cas/techalerts/TA04-104A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA04-104A.html - Third Party Advisory, US Government Resource
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15707 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/15707 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A890 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A890 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A911 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A911 -

Information

Published : 2004-06-01 04:00

Updated : 2024-11-20 23:45


NVD link : CVE-2003-0910

Mitre link : CVE-2003-0910

CVE.ORG link : CVE-2003-0910


JSON object : View

Products Affected

microsoft

  • windows_nt
  • windows_2000