Vulnerability Name:

CCN-13342

Published:2003-10-02
Updated:2003-10-02
Summary:Microsoft Windows could allow a local attacker to terminate programs without authorization, caused by a vulnerability in the PostThreadMessage API. The PostThreadMessage API allows a program to send a WM_QUIT, WM_CLOSE, or WM_DESTROY message to another program's thread on the same desktop to close the program. If the specified thread has a message queue, a local attacker could exploit this vulnerability to terminate processes, such as antivirus applications, personal firewall applications, filtering applications, and monitoring applications without permission.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: BugTraq Mailing List, Thu Oct 02 2003 - 00:28:00 CDT
Process Killing - Playing with PostThreadMessage

Source: CCN
Type: BID-8747
Microsoft Windows PostThreadMessage() Arbitrary Process Killing Vulnerability

Source: XF
Type: UNKNOWN
win-postthreadmessage-terminate-process(13342)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:microsoft:windows_nt:4.0::terminal_server:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000_advanced_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:::datacenter_server:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:::home:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:::professional:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:::professional:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0::server:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0::workstation:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:-::~~datacenter~~~:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:-::~~enterprise~~~:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:-::~~standard~~~:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2000:::server:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    microsoft windows nt 4.0
    microsoft windows 2000 advanced server *
    microsoft windows 2000
    microsoft windows xp
    microsoft windows xp
    microsoft windows 2000
    microsoft windows nt 4.0
    microsoft windows nt 4.0
    microsoft windows 2003 server -
    microsoft windows 2003 server -
    microsoft windows 2003 server -
    microsoft windows 2003 server web
    microsoft windows 2000