First published: Wed Oct 15 2008(Updated: )
afd.sys in the Ancillary Function Driver (AFD) component in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP1 and SP2 does not properly validate input sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, as demonstrated using crafted pointers and lengths that bypass intended ProbeForRead and ProbeForWrite restrictions, aka "AFD Kernel Overwrite Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2003 | =professional-sp3 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp3 | |
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2003 | ||
Microsoft Windows Server 2003 | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3464 is classified as a critical vulnerability allowing local privilege escalation.
To fix CVE-2008-3464, it is recommended to apply the latest security updates provided by Microsoft for affected operating systems.
CVE-2008-3464 affects Microsoft Windows XP SP2, SP3, and Windows Server 2003 SP1, SP2.
CVE-2008-3464 can be exploited by local users running crafted applications to gain elevated privileges.
While CVE-2008-3464 was reported in 2008, systems still running vulnerable versions of Windows remain at risk if not updated.