First published: Wed Dec 15 2004(Updated: )
The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows 2003 Server | =web-sp1_beta_1 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows 2003 Server | =web | |
Microsoft Windows 2003 Server | =enterprise | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows 2003 Server | =enterprise_64-bit | |
Microsoft Windows 2003 Server | =enterprise-sp1_beta_1 | |
Microsoft Windows XP | =gold | |
Microsoft Windows 2000 | ||
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows XP | ||
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows 2003 Server | =datacenter_64-bit-sp1_beta_1 | |
Microsoft Windows XP | ||
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows 2003 Server | =standard-sp1_beta_1 | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows 2003 Server | =r2-sp1_beta_1 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows 2000 | =sp1 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | ||
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows 2003 Server | =standard | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows 2003 Server | =enterprise_64-bit-sp1_beta_1 | |
Microsoft Windows 2003 Server | =r2 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows 2000 | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0893 has a critical severity due to its capability to allow local users to gain elevated privileges.
To fix CVE-2004-0893, it is recommended to apply the relevant security patches provided by Microsoft for affected Windows versions.
CVE-2004-0893 affects Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003.
CVE-2004-0893 can potentially allow local users to execute arbitrary code with elevated privileges.
There are no specific workarounds for CVE-2004-0893 apart from applying the security patches provided by Microsoft.