Vulnerability Name: CVE-2008-2252 (CCN-45543) Assigned: 2008-10-14 Published: 2008-10-14 Updated: 2019-10-09 Summary: The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate parameters sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability." CVSS v3 Severity: 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )5.3 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )5.3 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-264 Vulnerability Consequences: Gain Privileges References: Source: MITRE Type: CNACVE-2008-2252 Source: HP Type: Mailing List, Third Party AdvisorySSRT080143 Source: CCN Type: SA32247Microsoft Windows Privilege Escalation Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory32247 Source: CCN Type: SECTRACK ID: 1021046Windows Kernel Bugs Let Local Users Gain Elevated Privileges Source: CCN Type: Microsoft Security Bulletin MS08-061Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (954211) Source: BID Type: Patch, Third Party Advisory, VDB Entry31652 Source: CCN Type: BID-31652Microsoft Windows Kernel Memory Corruption Local Privilege Escalation Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry1021046 Source: CERT Type: Third Party Advisory, US Government ResourceTA08-288A Source: VUPEN Type: Broken LinkADV-2008-2812 Source: MS Type: Patch, Vendor AdvisoryMS08-061 Source: XF Type: UNKNOWNwin-kernel-input-privilege-escalation(45543) Source: XF Type: VDB Entrywin-kernel-input-privilege-escalation(45543) Source: XF Type: VDB Entrywin-ms08kb954211-update(45544) Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:6045 Vulnerable Configuration: Configuration 1 :cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2003:-:sp1:*:*:*:*:itanium:* OR cpe:/o:microsoft:windows_server_2003:-:sp1:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:itanium:* OR cpe:/o:microsoft:windows_vista:-:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:*:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_vista:-:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_xp:-:*:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_xp:-:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:* OR cpe:/o:microsoft:windows:2003_server::x64:*:*:*:*:* OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows:2003_server:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows:server_2003:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows:server_2003:sp2:itanium:*:*:*:*:* OR cpe:/o:microsoft:windows:server_2003:sp2:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:*:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_xp::sp2:x64:*:professional:*:*:* OR cpe:/o:microsoft:windows_vista:-:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:sp1:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:itanium:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x64:* OR cpe:/o:microsoft:windows:xp:sp3:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
microsoft windows 2000 - sp4
microsoft windows server 2003 - sp1
microsoft windows server 2003 - sp1
microsoft windows server 2003 - sp1
microsoft windows server 2003 - sp2
microsoft windows server 2008 -
microsoft windows server 2008 -
microsoft windows vista -
microsoft windows vista -
microsoft windows vista - sp1
microsoft windows vista - sp1
microsoft windows xp -
microsoft windows xp - sp2
microsoft windows xp - sp2
microsoft windows xp - sp3
microsoft windows 2000 - sp4
microsoft windows 2003_server
microsoft windows xp sp2
microsoft windows 2003_server sp1
microsoft windows 2003_server sp1_itanium
microsoft windows vista *
microsoft windows server_2003 sp2
microsoft windows server_2003 sp2
microsoft windows server_2003 sp2
microsoft windows vista -
microsoft windows xp sp2
microsoft windows vista - sp1
microsoft windows vista - sp1
microsoft windows server 2008 -
microsoft windows server 2008 -
microsoft windows server 2008 -
microsoft windows xp sp3