CVE-2006-2373 – Microsoft Windows - NtClose DeadLock (MS06-030)
https://notcve.org/view.php?id=CVE-2006-2373
The Server Message Block (SMB) driver (MRXSMB.SYS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows local users to execute arbitrary code by calling the MrxSmbCscIoctlOpenForCopyChunk function with the METHOD_NEITHER method flag and an arbitrary address, possibly for kernel memory, aka the "SMB Driver Elevation of Privilege Vulnerability." • https://www.exploit-db.com/exploits/1910 https://www.exploit-db.com/exploits/1911 http://secunia.com/advisories/20635 http://securitytracker.com/id?1016288 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=408 http://www.osvdb.org/26440 http://www.securityfocus.com/bid/18356 http://www.vupen.com/english/advisories/2006/2327 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-030 https://exchange.xforce.ibmcloud.com/vulnerabilities/26828 htt • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2005-1905 – Kaspersky AntiVirus - 'klif.sys' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2005-1905
The klif.sys driver in Kaspersky Labs Anti-Virus 5.0.227, 5.0.228, and 5.0.335 on Windows 2000 allows local users to gain privileges by modifying certain critical code addresses that are later accessed by privileged programs. • https://www.exploit-db.com/exploits/1032 http://marc.info/?l=bugtraq&m=111817777430401&w=2 http://www.securityfocus.com/bid/13878 •
CVE-2003-1233
https://notcve.org/view.php?id=CVE-2003-1233
Pedestal Software Integrity Protection Driver (IPD) 1.3 and earlier allows privileged attackers, such as rootkits, to bypass file access restrictions to the Windows kernel by using the NtCreateSymbolicLinkObject function to create a symbolic link to (1) \Device\PhysicalMemory or (2) to a drive letter using the subst command. • http://archives.neohapsis.com/archives/bugtraq/2003-01/0017.html http://archives.neohapsis.com/archives/bugtraq/2003-01/0018.html http://secunia.com/advisories/7816 http://www.phrack.org/show.php?p=59&a=16 http://www.securityfocus.com/bid/6511 https://exchange.xforce.ibmcloud.com/vulnerabilities/10979 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2003-0001 – Linux Kernel 2.0.x/2.2.x/2.4.x (FreeBSD 4.x) - Network Device Driver Frame Padding Information Disclosure
https://notcve.org/view.php?id=CVE-2003-0001
Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak. Múltiples controladores de dispositivo (device drivers) de Tarjetas de Interfaz de Red (Network Interface Card - NIC) Ethernet no rellenan las tramas con bytes nulos, lo que permite a atacantes remotos obtener información de paquetes anteriores o memoria del kernel usando paquetes malformados, como ha sido demostrado por Etherleak. • https://www.exploit-db.com/exploits/22131 https://www.exploit-db.com/exploits/26076 https://www.exploit-db.com/exploits/3555 https://github.com/marb08/etherleak-checker http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0016.html http://marc.info/?l=bugtraq&m=104222046632243&w=2 http://secunia.com/advisories/7996 http://www.atstake.com/research/advisories/2003/a010603-1.txt http://www.atstake.com/research/advisories/2003/atstake_etherleak_report.pdf http://www.kb. • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •