The component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.ciac.org/ciac/bulletins/o-114.shtml | third-party-advisory government-resource x_refsource_CIAC |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1718 | vdb-entry signature x_refsource_OVAL |
| http://www.kb.cert.org/vuls/id/783748 | third-party-advisory x_refsource_CERT-VN |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/15714 | vdb-entry x_refsource_XF |
| http://www.eeye.com/html/Research/Advisories/AD20040413E.html | third-party-advisory x_refsource_EEYE |
| https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 | vendor-advisory x_refsource_MS |
| http://www.securityfocus.com/bid/10117 | vdb-entry x_refsource_BID |
| http://www.us-cert.gov/cas/techalerts/TA04-104A.html | third-party-advisory x_refsource_CERT |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1512 | vdb-entry signature x_refsource_OVAL |
| http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020070.html | mailing-list x_refsource_FULLDISC |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|