CVE-2002-0367
high-risk
Published 2002-06-25
smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
Do I need to act?
~
1.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (3)
Affected Vendors
References (19)
Mailing List
http://marc.info/?l=ntbugtraq&m=101614320402695&w=2
Broken Link
http://www.securityfocus.com/archive/1/262074
Broken Link
http://www.securityfocus.com/archive/1/264441
Broken Link
http://www.securityfocus.com/archive/1/264927
Broken Link
http://www.securityfocus.com/bid/4287
Mailing List
http://marc.info/?l=ntbugtraq&m=101614320402695&w=2
Broken Link
http://www.securityfocus.com/archive/1/262074
Broken Link
http://www.securityfocus.com/archive/1/264441
Broken Link
http://www.securityfocus.com/archive/1/264927
Broken Link
http://www.securityfocus.com/bid/4287
51
/ 100
high-risk
Severity
24/34 · High
Exploitability
18/34 · Moderate
Exposure
9/34 · Low