First published: Wed Oct 15 2008(Updated: )
The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate parameters sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows XP | =sp3 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Vista | =sp1 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows Vista | ||
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | ||
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows XP | ||
Microsoft Windows Server 2003 | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2252 has a high severity rating due to its potential to allow local privilege escalation.
To mitigate CVE-2008-2252, you should apply the relevant security patches released by Microsoft.
CVE-2008-2252 affects Microsoft Windows 2000 SP4, XP SP2/SP3, Server 2003 SP1/SP2, Vista Gold/SP1, and Server 2008.
CVE-2008-2252 allows local users to execute crafted applications that can exploit kernel memory corruption for privilege escalation.
Temporary workarounds for CVE-2008-2252 may include limiting user access and minimizing the use of administrative privileges until patches can be applied.