First published: Wed Feb 08 2006(Updated: )
Microsoft Windows XP SP1 and SP2 before August 2004, and possibly other operating systems and versions, uses insecure default ACLs that allow the Authenticated Users group to gain privileges by modifying critical configuration information for the (1) Simple Service Discovery Protocol (SSDP), (2) Universal Plug and Play Device Host (UPnP), (3) NetBT, (4) SCardSvr, (5) DHCP, and (6) DnsCache services, aka "Permissive Windows Services DACLs." NOTE: the NetBT, SCardSvr, DHCP, DnsCache already require privileged access to exploit.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows XP | =sp1 | |
Microsoft Windows XP | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0023 is considered high severity due to the potential for privilege escalation.
To fix CVE-2006-0023, update your Microsoft Windows XP installation to the latest service pack or patch provided by Microsoft.
CVE-2006-0023 affects Microsoft Windows XP SP1 and SP2, and potentially other versions of Windows.
CVE-2006-0023 allows authenticated users to modify critical system configuration settings, leading to potential misuse.
While CVE-2006-0023 primarily affects older versions of Windows, it may still be a concern for legacy systems that are not updated.