First published: Wed Oct 15 2008(Updated: )
Integer overflow in Memory Manager in Microsoft Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows local users to gain privileges via a crafted application that triggers an erroneous decrement of a variable, related to validation of parameters for Virtual Address Descriptors (VADs) and a "memory allocation mapping error," aka "Virtual Address Descriptor Elevation of Privilege Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =x64 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows Vista | ||
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp1 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows XP | =sp3 | |
Microsoft Windows Vista | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Vista | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4036 has a critical severity rating due to its ability to allow local users to gain elevated privileges.
To fix CVE-2008-4036, ensure that you have applied the latest security patches provided by Microsoft for the affected versions of Windows.
CVE-2008-4036 affects Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Windows Vista Gold and SP1, and Windows Server 2008.
An attacker exploiting CVE-2008-4036 can run arbitrary code with elevated privileges on the affected system.
While applying the patch is the best solution, a temporary workaround may include limiting local user access to prevent exploitation.