Vulnerability Name: | CVE-1999-1084 (CCN-4111) | ||||||||
Assigned: | 1999-12-31 | ||||||||
Published: | 1999-12-31 | ||||||||
Updated: | 2018-10-12 | ||||||||
Summary: | The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash. | ||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Wed, 22 Sep 1999 01:07:54 -0500 Update to ODBC/RDS vulnerabilities Source: MITRE Type: CNA CVE-1999-1084 Source: NTBUGTRAQ Type: UNKNOWN 19980622 Yet another "get yourself admin rights exploit": Source: MSKB Type: Patch, Vendor Advisory Q103861 Source: CCN Type: CIAC Information Bulletin K-029 Microsoft "Registry Permissions" Vulnerability Source: CIAC Type: Patch, Vendor Advisory K-029 Source: CCN Type: Microsoft Security Bulletin MS00-008 FAQ Patch Available for "Registry Permissions" Vulnerability Source: CCN Type: Microsoft Security Bulletin MS00-008 Patch Available for "Registry Permissions" Vulnerability Source: CCN Type: Microsoft Security Bulletin MS01-041 Malformed RPC Request Can Cause Service Failure Source: CCN Type: Microsoft Security Bulletin MS02-001 Trusting Domains Do Not Verify Domain Membership of SIDs in Authorization Data Source: CCN Type: Microsoft Security Bulletin MS02-018 Cumulative Patch for Internet Information Services (Q319733) Source: CCN Type: National Infrastructure Protection Center 00-060 "E-Commerce Vulnerabilities" Source: CCN Type: NTBugTraq Mailing List, Mon, 22 Jun 1998 18:21:37 +0100 Yet another "get yourself admin rights exploit": Source: CCN Type: OSVDB ID: 6790 Microsoft Windows NT AEDebug Registry Key Weak Permissions Source: CCN Type: BID-1042 NT User Shell Folders Vulnerability Source: BID Type: Exploit, Patch, Vendor Advisory 1044 Source: CCN Type: BID-1044 Microsoft Windows AEDEBUG Registry Key Vulnerability Source: CCN Type: BID-654 Microsoft JET/ODBC Patch and RDS Fix Registry Key Vulnerabilities Source: MS Type: UNKNOWN MS00-008 Source: XF Type: UNKNOWN nt-registry-permissions(4111) Source: CCN Type: Microsoft Knowledge Base Article 103861 INFO: Choosing the Debugger That the System Will Spawn | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |