Vulnerability Name:

CVE-1999-1084 (CCN-4111)

Assigned:1999-12-31
Published:1999-12-31
Updated:2018-10-12
Summary:The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Wed, 22 Sep 1999 01:07:54 -0500
Update to ODBC/RDS vulnerabilities

Source: MITRE
Type: CNA
CVE-1999-1084

Source: NTBUGTRAQ
Type: UNKNOWN
19980622 Yet another "get yourself admin rights exploit":

Source: MSKB
Type: Patch, Vendor Advisory
Q103861

Source: CCN
Type: CIAC Information Bulletin K-029
Microsoft "Registry Permissions" Vulnerability

Source: CIAC
Type: Patch, Vendor Advisory
K-029

Source: CCN
Type: Microsoft Security Bulletin MS00-008 FAQ
Patch Available for "Registry Permissions" Vulnerability

Source: CCN
Type: Microsoft Security Bulletin MS00-008
Patch Available for "Registry Permissions" Vulnerability

Source: CCN
Type: Microsoft Security Bulletin MS01-041
Malformed RPC Request Can Cause Service Failure

Source: CCN
Type: Microsoft Security Bulletin MS02-001
Trusting Domains Do Not Verify Domain Membership of SIDs in Authorization Data

Source: CCN
Type: Microsoft Security Bulletin MS02-018
Cumulative Patch for Internet Information Services (Q319733)

Source: CCN
Type: National Infrastructure Protection Center 00-060
"E-Commerce Vulnerabilities"

Source: CCN
Type: NTBugTraq Mailing List, Mon, 22 Jun 1998 18:21:37 +0100
Yet another "get yourself admin rights exploit":

Source: CCN
Type: OSVDB ID: 6790
Microsoft Windows NT AEDebug Registry Key Weak Permissions

Source: CCN
Type: BID-1042
NT User Shell Folders Vulnerability

Source: BID
Type: Exploit, Patch, Vendor Advisory
1044

Source: CCN
Type: BID-1044
Microsoft Windows AEDEBUG Registry Key Vulnerability

Source: CCN
Type: BID-654
Microsoft JET/ODBC Patch and RDS Fix Registry Key Vulnerabilities

Source: MS
Type: UNKNOWN
MS00-008

Source: XF
Type: UNKNOWN
nt-registry-permissions(4111)

Source: CCN
Type: Microsoft Knowledge Base Article 103861
INFO: Choosing the Debugger That the System Will Spawn

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:jet:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:data_access_components:2.12.4202.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    microsoft windows nt 4.0
    microsoft windows nt 4.0
    microsoft windows nt 4.0
    microsoft jet 4.0
    microsoft data access components 2.12.4202.3