ID

VAR-200802-0020


CVE

CVE-2008-0074


TITLE

Microsoft IIS Elevation of Privilege Vulnerability in File Change Notification

Trust: 0.8

sources: JVNDB: JVNDB-2008-001105

DESCRIPTION

Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders. A local attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. SOLUTION: Apply patches. Microsoft Windows 2000 Service Pack 4: http://www.microsoft.com/downloads/details.aspx?familyid=b24f34fb-40b9-4aa5-b5ac-e3f0a6062753 Windows XP Professional SP2: http://www.microsoft.com/downloads/details.aspx?familyid=73d24fcf-bea9-4b13-9f1c-4e068c53a4ae Windows XP Professional x64 Edition (optionally with SP2): http://www.microsoft.com/downloads/details.aspx?familyid=103a6bc0-034a-443d-b1d4-81117820dcb2 Windows Server 2003 SP1 / SP2: http://www.microsoft.com/downloads/details.aspx?familyid=516ef8e8-3cb6-4660-b771-3c7f66917a11 Windows Server 2003 x64 Edition (optionally SP2): http://www.microsoft.com/downloads/details.aspx?familyid=e24fb33c-67b9-4ed4-9317-b5fd535d005a Windows Server 2003 with SP1/SP2 for Itanium-based systems: http://www.microsoft.com/downloads/details.aspx?familyid=5a4a6083-8c67-4403-8e20-7f2b82178124 Windows Vista: http://www.microsoft.com/downloads/details.aspx?familyid=8c7018ec-ae80-4a30-93fc-0f7386732514 Windows Vista x64 Edition: http://www.microsoft.com/downloads/details.aspx?familyid=4de2fffc-5793-4acf-98ee-1b801e59ae39 PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: MS08-005 (KB942831): http://www.microsoft.com/technet/security/Bulletin/MS08-005.mspx ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA08-043C Microsoft Updates for Multiple Vulnerabilities Original release date: February 12, 2008 Last revised: February 12, 2008 Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Microsoft Office * Microsoft Visual Basic * Microsoft Internet Information Services (IIS) Overview Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Internet Explorer, Office, Visual Basic and Internet Information Services (IIS). I. Description Microsoft has released updates to address vulnerabilities that affect Microsoft Windows, Internet Explorer, Office, Visual Basic and Internet Information Services (IIS) as part of the Microsoft Security Bulletin Summary for February 2008. For more information, see the US-CERT Vulnerability Notes Database. II. III. Solution Apply updates from Microsoft Microsoft has provided updates for these vulnerabilities in the February 2008 security bulletins. The security bulletins describe any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. Administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). IV. References * US-CERT Vulnerability Notes for Microsoft February 2008 updates - <http://www.kb.cert.org/vuls/byid?searchview&query=ms08-feb> * Microsoft Security Bulletin Summary for February 2008 - <http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx> * Microsoft Update - <https://www.update.microsoft.com/microsoftupdate/> * Windows Server Update Services - <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx> _________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA08-043C.html> _________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA08-043C Feedback VU#104665" in the subject. _________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. _________________________________________________________________ Produced 2008 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> _________________________________________________________________ Revision History February 12, 2008: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBR7IkKvRFkHkM87XOAQIMdgf/Z4QINqEeDeTdbKj9Jn4K+v5WKr+GWL0R J3C7PfJyQvqnl0ctnqF4DOBvi8xgPXWuhCqh6XEgi7ImkJVxI8HPpy1gj8K9YC5J ZDidLPOPvo3suzeEw3pNX/9oN9sOSsvCxwkzgq3cw7e3/vh69zLJWEg3Mz5Vc0UC lU8u4HLMpDFXzn2NA3/YlTDyc45OV3Z5LCA8GHkqIBzZLZUtprIjIeXBOxbY3pqw Ac9f8FB5c88PHW8+34pXmzt7QXuynW+8yrCuApIc0ZduUpB1+7Pi1aVmDwxxGdSz GUP3Ue8minBwUIyBn3h1jxUwO7nADPToVVLHj8fwHaFXvoNQha8iKg== =imPA -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2008-0074 // JVNDB: JVNDB-2008-001105 // BID: 27101 // PACKETSTORM: 63557 // PACKETSTORM: 63559

AFFECTED PRODUCTS

vendor:microsoftmodel:iisscope:eqversion:7.0

Trust: 1.7

vendor:microsoftmodel:internet information serverscope:eqversion:6.0

Trust: 1.6

vendor:microsoftmodel:internet information servicesscope:eqversion:5.0

Trust: 1.6

vendor:microsoftmodel:iisscope:eqversion:6.0

Trust: 1.1

vendor:microsoftmodel:iisscope:eqversion:5.1

Trust: 1.1

vendor:microsoftmodel:iisscope:eqversion:5.0

Trust: 1.1

vendor:microsoftmodel:windows 2000scope: - version: -

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:none

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(itanium)

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows vistascope:eqversion:none

Trust: 0.8

vendor:microsoftmodel:windows vistascope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows xpscope:eqversion:sp3

Trust: 0.8

vendor:microsoftmodel:internet information serverscope:eqversion:5.1

Trust: 0.6

vendor:microsoftmodel:internet information serverscope:eqversion:5.0

Trust: 0.6

vendor:nortelmodel:networks centrex ip client managerscope:eqversion:9.0

Trust: 0.3

vendor:nortelmodel:networks centrex ip client managerscope:eqversion:10.0

Trust: 0.3

vendor:hpmodel:storage management appliancescope:eqversion:2.1

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:1.1

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:0

Trust: 0.3

sources: BID: 27101 // JVNDB: JVNDB-2008-001105 // CNNVD: CNNVD-200802-227 // NVD: CVE-2008-0074

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0074
value: HIGH

Trust: 1.0

NVD: CVE-2008-0074
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200802-227
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2008-0074
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2008-001105 // CNNVD: CNNVD-200802-227 // NVD: CVE-2008-0074

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.8

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-noinfo

Trust: 0.8

sources: JVNDB: JVNDB-2008-001105 // NVD: CVE-2008-0074

THREAT TYPE

local

Trust: 1.0

sources: BID: 27101 // PACKETSTORM: 63557 // CNNVD: CNNVD-200802-227

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-200802-227

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001105

PATCH

title:MS08-005url:http://www.microsoft.com/technet/security/bulletin/ms08-005.mspx

Trust: 0.8

title:MS08-005url:http://www.microsoft.com/japan/technet/security/bulletin/ms08-005.mspx

Trust: 0.8

title:MS08-005eurl:http://www.microsoft.com/japan/security/bulletins/MS08-005e.mspx

Trust: 0.8

title:TA08-043Curl:http://software.fujitsu.com/jp/security/vulnerabilities/ta08-043c.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-001105

EXTERNAL IDS

db:NVDid:CVE-2008-0074

Trust: 2.7

db:BIDid:27101

Trust: 2.7

db:USCERTid:TA08-043C

Trust: 2.5

db:SECUNIAid:28849

Trust: 2.5

db:SECTRACKid:1019384

Trust: 2.4

db:VUPENid:ADV-2008-0507

Trust: 1.6

db:USCERTid:SA08-043C

Trust: 0.8

db:JVNDBid:JVNDB-2008-001105

Trust: 0.8

db:CNNVDid:CNNVD-200802-227

Trust: 0.6

db:PACKETSTORMid:63557

Trust: 0.1

db:PACKETSTORMid:63559

Trust: 0.1

sources: BID: 27101 // JVNDB: JVNDB-2008-001105 // PACKETSTORM: 63557 // PACKETSTORM: 63559 // CNNVD: CNNVD-200802-227 // NVD: CVE-2008-0074

REFERENCES

url:http://secunia.com/advisories/28849

Trust: 2.4

url:http://www.securityfocus.com/bid/27101

Trust: 2.4

url:http://www.securitytracker.com/id?1019384

Trust: 2.4

url:http://www.us-cert.gov/cas/techalerts/ta08-043c.html

Trust: 2.4

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-005

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=120361015026386&w=2

Trust: 1.6

url:http://www.vupen.com/english/advisories/2008/0507/references

Trust: 1.6

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5389

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0074

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/0507

Trust: 0.8

url:http://www.jpcert.or.jp/at/2008/at080003.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta08-043c/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta08-043c/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0074

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa08-043c.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2008/20080214_212436.html

Trust: 0.8

url:http://www.microsoft.com/technet/security/bulletin/ms08-005.mspx

Trust: 0.4

url:http://www.microsoft.com

Trust: 0.3

url:http://www.microsoft.com/windowsserver2003/iis/default.mspx

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2008-064.htm

Trust: 0.3

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&documentoid=702601&poid=

Trust: 0.3

url:http://secunia.com/product/17543/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=8c7018ec-ae80-4a30-93fc-0f7386732514

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/28849/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=b24f34fb-40b9-4aa5-b5ac-e3f0a6062753

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=516ef8e8-3cb6-4660-b771-3c7f66917a11

Trust: 0.1

url:http://secunia.com/product/39/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=73d24fcf-bea9-4b13-9f1c-4e068c53a4ae

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=5a4a6083-8c67-4403-8e20-7f2b82178124

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=103a6bc0-034a-443d-b1d4-81117820dcb2

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=e24fb33c-67b9-4ed4-9317-b5fd535d005a

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=4de2fffc-5793-4acf-98ee-1b801e59ae39

Trust: 0.1

url:http://secunia.com/product/1438/

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta08-043c.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=ms08-feb>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms08-feb.mspx>

Trust: 0.1

url:http://www.microsoft.com/windowsserversystem/updateservices/default.mspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:https://www.update.microsoft.com/microsoftupdate/>

Trust: 0.1

sources: BID: 27101 // JVNDB: JVNDB-2008-001105 // PACKETSTORM: 63557 // PACKETSTORM: 63559 // CNNVD: CNNVD-200802-227 // NVD: CVE-2008-0074

CREDITS

Microsoft

Trust: 0.6

sources: CNNVD: CNNVD-200802-227

SOURCES

db:BIDid:27101
db:JVNDBid:JVNDB-2008-001105
db:PACKETSTORMid:63557
db:PACKETSTORMid:63559
db:CNNVDid:CNNVD-200802-227
db:NVDid:CVE-2008-0074

LAST UPDATE DATE

2025-04-10T21:50:17.492000+00:00


SOURCES UPDATE DATE

db:BIDid:27101date:2008-03-25T18:00:00
db:JVNDBid:JVNDB-2008-001105date:2008-02-28T00:00:00
db:CNNVDid:CNNVD-200802-227date:2019-07-09T00:00:00
db:NVDid:CVE-2008-0074date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:BIDid:27101date:2008-02-12T00:00:00
db:JVNDBid:JVNDB-2008-001105date:2008-02-28T00:00:00
db:PACKETSTORMid:63557date:2008-02-12T22:59:25
db:PACKETSTORMid:63559date:2008-02-12T23:07:55
db:CNNVDid:CNNVD-200802-227date:2008-02-12T00:00:00
db:NVDid:CVE-2008-0074date:2008-02-12T21:00:00