| Title | Microsoft Windows における権限昇格の脆弱性 |
|---|---|
| Summary | Microsoft Windows には、検索パスに関する処理に不備があるため、権限を取得される脆弱性が存在します。 |
| Possible impacts | ローカルユーザにより、カレントワーキングディレクトリ内にあるトロイの木馬の DLL を介して、権限を取得される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Sept. 13, 2011, midnight |
| Registration Date | Oct. 20, 2011, 4:17 p.m. |
| Last Update | Oct. 20, 2011, 4:17 p.m. |
| CVSS2.0 : 危険 | |
| Score | 9.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:C/I:C/A:C |
| マイクロソフト |
| Microsoft Windows 7 (x32) |
| Microsoft Windows 7 (x64) |
| Microsoft Windows Server 2003 |
| Microsoft Windows Server 2003 (itanium) |
| Microsoft Windows Server 2003 (x64) |
| Microsoft Windows Server 2008 (itanium) |
| Microsoft Windows Server 2008 (x64) |
| Microsoft Windows Server 2008 (x86) |
| Microsoft Windows Server 2008 r2(itanium) |
| Microsoft Windows Server 2008 r2(x64) |
| Microsoft Windows Vista |
| Microsoft Windows Vista (x64) |
| Microsoft Windows XP (x64) |
| Microsoft Windows XP sp3 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2011年10月20日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | Multiple untrusted search path vulnerabilities in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allow local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .doc, .rtf, or .txt file, related to (1) deskpan.dll in the Display Panning CPL Extension, (2) EAPHost Authenticator Service, (3) Folder Redirection, (4) HyperTerminal, (5) the Japanese Input Method Editor (IME), and (6) Microsoft Management Console (MMC), aka "Windows Components Insecure Library Loading Vulnerability." |
|---|---|
| Publication Date | Sept. 15, 2011, 9:26 p.m. |
| Registration Date | Jan. 28, 2021, 4:38 p.m. |
| Last Update | Nov. 21, 2024, 10:27 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:* | |||||