CVE-2004-0893

Current Description

The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."

Basic Data

PublishedJanuary 10, 2005
Last ModifiedApril 30, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSMicrosoftWindows 2000********
    2.3OSMicrosoftWindows 2000*sp1******
    2.3OSMicrosoftWindows 2000*sp2******
    2.3OSMicrosoftWindows 2000*sp3******
    2.3OSMicrosoftWindows 2000*sp4******
    2.3OSMicrosoftWindows 2003 Serverdatacenter_64-bitsp1_beta_1******
    2.3OSMicrosoftWindows 2003 Serverenterprise*64-bit*****
    2.3OSMicrosoftWindows 2003 Serverenterprisesp1_beta_1******
    2.3OSMicrosoftWindows 2003 Serverenterprise_64-bit*******
    2.3OSMicrosoftWindows 2003 Serverenterprise_64-bitsp1_beta_1******
    2.3OSMicrosoftWindows 2003 Serverr2*64-bit*****
    2.3OSMicrosoftWindows 2003 Serverr2*datacenter_64-bit*****
    2.3OSMicrosoftWindows 2003 Serverr2sp1_beta_1******
    2.3OSMicrosoftWindows 2003 Serverstandard*64-bit*****
    2.3OSMicrosoftWindows 2003 Serverstandardsp1_beta_1******
    2.3OSMicrosoftWindows 2003 Serverweb*******
    2.3OSMicrosoftWindows 2003 Serverwebsp1_beta_1******
    2.3OSMicrosoftWindows Nt4.0*enterprise_server*****
    2.3OSMicrosoftWindows Nt4.0*server*****
    2.3OSMicrosoftWindows Nt4.0*terminal_server*****
    2.3OSMicrosoftWindows Nt4.0*workstation*****
    2.3OSMicrosoftWindows Nt4.0sp1enterprise_server*****
    2.3OSMicrosoftWindows Nt4.0sp1server*****
    2.3OSMicrosoftWindows Nt4.0sp1terminal_server*****
    2.3OSMicrosoftWindows Nt4.0sp1workstation*****
    2.3OSMicrosoftWindows Nt4.0sp2enterprise_server*****
    2.3OSMicrosoftWindows Nt4.0sp2server*****
    2.3OSMicrosoftWindows Nt4.0sp2terminal_server*****
    2.3OSMicrosoftWindows Nt4.0sp2workstation*****
    2.3OSMicrosoftWindows Nt4.0sp3enterprise_server*****
    2.3OSMicrosoftWindows Nt4.0sp3server*****
    2.3OSMicrosoftWindows Nt4.0sp3terminal_server*****
    2.3OSMicrosoftWindows Nt4.0sp3workstation*****
    2.3OSMicrosoftWindows Nt4.0sp4enterprise_server*****
    2.3OSMicrosoftWindows Nt4.0sp4server*****
    2.3OSMicrosoftWindows Nt4.0sp4terminal_server*****
    2.3OSMicrosoftWindows Nt4.0sp4workstation*****
    2.3OSMicrosoftWindows Nt4.0sp5enterprise_server*****
    2.3OSMicrosoftWindows Nt4.0sp5server*****
    2.3OSMicrosoftWindows Nt4.0sp5terminal_server*****
    2.3OSMicrosoftWindows Nt4.0sp5workstation*****
    2.3OSMicrosoftWindows Nt4.0sp6enterprise_server*****
    2.3OSMicrosoftWindows Nt4.0sp6server*****
    2.3OSMicrosoftWindows Nt4.0sp6terminal_server*****
    2.3OSMicrosoftWindows Nt4.0sp6workstation*****
    2.3OSMicrosoftWindows Nt4.0sp6aenterprise_server*****
    2.3OSMicrosoftWindows Nt4.0sp6aserver*****
    2.3OSMicrosoftWindows Nt4.0sp6aworkstation*****
    2.3OSMicrosoftWindows Xp**64-bit*****
    2.3OSMicrosoftWindows Xp**home*****
    2.3OSMicrosoftWindows Xp**media_center*****
    2.3OSMicrosoftWindows Xp*goldprofessional*****
    2.3OSMicrosoftWindows Xp*sp164-bit*****
    2.3OSMicrosoftWindows Xp*sp1home*****
    2.3OSMicrosoftWindows Xp*sp1media_center*****
    2.3OSMicrosoftWindows Xp*sp2home*****
    2.3OSMicrosoftWindows Xp*sp2media_center*****

Vulnerable Software List

VendorProductVersions
Microsoft Windows Xp *
Microsoft Windows 2000 *
Microsoft Windows 2003 Server datacenter_64-bit, enterprise, enterprise_64-bit, r2, standard, web
Microsoft Windows Nt 4.0

References

NameSourceURLTags
MS04-044https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044MS
win-kernel-lpc-gain-privileges(18339)https://exchange.xforce.ibmcloud.com/vulnerabilities/18339XF
oval:org.mitre.oval:def:1321https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1321OVAL
oval:org.mitre.oval:def:1561https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1561OVAL
oval:org.mitre.oval:def:1581https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1581OVAL
oval:org.mitre.oval:def:1886https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1886OVAL
oval:org.mitre.oval:def:2008https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2008OVAL
oval:org.mitre.oval:def:4021https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4021OVAL
oval:org.mitre.oval:def:4458https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4458OVAL
oval:org.mitre.oval:def:450https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A450OVAL