Last Modified: Sept. 5, 2008
Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext.
Access Vector: Local
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Partial
Base Score: 2.1
Exploitability Score: 3.9
Impact Score: 2.9
CVSS V2: AV:L/AC:L/Au:N/C:N/I:N/A:P
NVD-CWE-Other
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:* Part: o Vendor: microsoft | Alle Schwachstellen für microsoft |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="local"/> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*"/> </set> <set operator="or"> <prop key="program_influence" value="input"/> <prop key="program_influence" value="existence"/> </set> <prop key="range" value="local"/> </set>