7.2
CVE-2004-0893
- EPSS 0.93%
- Published 10.01.2005 05:00:00
- Last modified 03.04.2025 01:03:51
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Windows 2000 Updatesp1
Microsoft ≫ Windows 2000 Updatesp2
Microsoft ≫ Windows 2000 Updatesp3
Microsoft ≫ Windows 2000 Updatesp4
Microsoft ≫ Windows 2003 Server Versiondatacenter_64-bit Updatesp1_beta_1
Microsoft ≫ Windows 2003 Server Versionenterprise Edition64-bit
Microsoft ≫ Windows 2003 Server Versionenterprise Updatesp1_beta_1
Microsoft ≫ Windows 2003 Server Versionenterprise_64-bit
Microsoft ≫ Windows 2003 Server Versionenterprise_64-bit Updatesp1_beta_1
Microsoft ≫ Windows 2003 Server Versionr2 Edition64-bit
Microsoft ≫ Windows 2003 Server Versionr2 Editiondatacenter_64-bit
Microsoft ≫ Windows 2003 Server Versionr2 Updatesp1_beta_1
Microsoft ≫ Windows 2003 Server Versionstandard Edition64-bit
Microsoft ≫ Windows 2003 Server Versionstandard Updatesp1_beta_1
Microsoft ≫ Windows 2003 Server Versionweb
Microsoft ≫ Windows 2003 Server Versionweb Updatesp1_beta_1
Microsoft ≫ Windows Nt Version4.0 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Editionserver
Microsoft ≫ Windows Nt Version4.0 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp1 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp1 Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp1 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Updatesp1 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp2 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp2 Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp2 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Updatesp2 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp3 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp3 Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp3 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Updatesp3 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp4 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp4 Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp4 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Updatesp4 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp5 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp5 Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp5 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Updatesp5 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp6 Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp6 Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp6 Editionterminal_server
Microsoft ≫ Windows Nt Version4.0 Updatesp6 Editionworkstation
Microsoft ≫ Windows Nt Version4.0 Updatesp6a Editionenterprise_server
Microsoft ≫ Windows Nt Version4.0 Updatesp6a Editionserver
Microsoft ≫ Windows Nt Version4.0 Updatesp6a Editionworkstation
Microsoft ≫ Windows Xp Edition64-bit
Microsoft ≫ Windows Xp Editionhome
Microsoft ≫ Windows Xp Editionmedia_center
Microsoft ≫ Windows Xp Updategold Editionprofessional
Microsoft ≫ Windows Xp Updatesp1 Edition64-bit
Microsoft ≫ Windows Xp Updatesp1 Editionhome
Microsoft ≫ Windows Xp Updatesp1 Editionmedia_center
Microsoft ≫ Windows Xp Updatesp2 Editionhome
Microsoft ≫ Windows Xp Updatesp2 Editionmedia_center
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.93% | 0.753 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|