Vulnerability Name: | CCN-11536 | ||||||
Published: | 2003-03-13 | ||||||
Updated: | 2003-03-13 | ||||||
Summary: | Microsoft Windows 2000 and Windows XP could allow a local attacker to obtain user passwords, caused by a vulnerability in the PostMessage() API function, which posts a message to the Windows API message queue. The PostMessage() API function fails to properly validate a message's handle and type before sending the message to any message queue. If the PostMessage() API function is invoked with the EM_SETPASSWORDCHAR message, a local attacker could obtain a victim's password from the Password dialog box. | ||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||
CVSS v2 Severity: | 2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
| ||||||
Vulnerability Consequences: | Obtain Information | ||||||
References: | Source: CCN Type: BugTraq Mailing List, Thu Mar 13 2003 - 15:07:08 CST Win32: Postmessage API security flaw Source: CCN Type: BID-7092 Microsoft Windows PostMessage API Unmasked Password Weakness Source: XF Type: UNKNOWN win-postmessage-password-disclosure(11536) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |