Vulnerability Name: | CCN-11822 | ||||||
Published: | 2003-04-16 | ||||||
Updated: | 2003-04-16 | ||||||
Summary: | Microsoft Windows platforms could allow a local attacker to execute commands on the system, caused by a vulnerability in the RegEnumValueW function in the 'regedit.exe' registry editor. By trapping a registry key, a local attacker could execute arbitrary commands on the system with the same privileges of the victim, once the registry key is browsed by the victim using the 'regedit.exe' registry editor.
Note: The 'regedt32.exe' registry editor is not vulnerable. | ||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||
CVSS v2 Severity: | 4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||
Vulnerability Consequences: | Gain Privileges | ||||||
References: | Source: CCN Type: NTBugTraq Mailing List, Wed Apr 16 2003 - 11:07:35 CDT a NEW vulnerability in REGEDIT.EXE Source: CCN Type: BID-7411 Microsoft Windows RegEdit.EXE Registry Key Value Buffer Overflow Vulnerability Source: XF Type: UNKNOWN win-regedit-command-execution(11822) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |