[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Privilege escalation vulnerability in Ancillary Function Driver in Microsoft Windows

ID: oval:org.secpod.oval:def:4133Date: (C)2012-02-16   (M)2023-12-14
Class: VULNERABILITYFamily: windows




The host is installed with Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, R2 SP1, Windows 7 Gold or SP1 on 64-bit platforms and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly validate user-mode input passed to kernel mode. Successful exploitation could allow attackers to install programs; view, change, or delete data; or create new accounts with full administrative rights.

Platform:
Microsoft Windows Server 2008 R2
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows 7
Reference:
CVE-2012-0148
CVE    1
CVE-2012-0148
CPE    21
cpe:/o:microsoft:windows_2003_server::gold:itanium
cpe:/o:microsoft:windows_server_2008:r2:sp1:x64
cpe:/o:microsoft:windows_server_2008:::x64
cpe:/o:microsoft:windows_7::sp1:x64
...

© SecPod Technologies