CVE-2007-5633
Vulnerability from cvelistv5
Published
2007-10-23 17:00
Modified
2024-08-07 15:39
Severity ?
EPSS score ?
Summary
Speedfan.sys in Alfredo Milani Comparetti SpeedFan 4.33, when used on Microsoft Windows Vista x64, allows local users to read or write arbitrary MSRs, and gain privileges and load unsigned drivers, via the (1) IOCTL_RDMSR 0x9C402438 and (2) IOCTL_WRMSR 0x9C40243C IOCTLs to \Device\speedfan, as demonstrated by an IOCTL_WRMSR action on MSR_LSTAR.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:39:13.623Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "speedfan-ioctl-privilege-escalation(37298)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37298" }, { "name": "41842", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/41842" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.reversemode.com/index.php?option=com_content\u0026task=view\u0026id=42\u0026Itemid=1" }, { "name": "26123", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26123" }, { "name": "27312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27312" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.bugtrack.almico.com/view.php?id=987" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-10-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Speedfan.sys in Alfredo Milani Comparetti SpeedFan 4.33, when used on Microsoft Windows Vista x64, allows local users to read or write arbitrary MSRs, and gain privileges and load unsigned drivers, via the (1) IOCTL_RDMSR 0x9C402438 and (2) IOCTL_WRMSR 0x9C40243C IOCTLs to \\Device\\speedfan, as demonstrated by an IOCTL_WRMSR action on MSR_LSTAR." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "speedfan-ioctl-privilege-escalation(37298)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37298" }, { "name": "41842", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/41842" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.reversemode.com/index.php?option=com_content\u0026task=view\u0026id=42\u0026Itemid=1" }, { "name": "26123", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26123" }, { "name": "27312", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27312" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.bugtrack.almico.com/view.php?id=987" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5633", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Speedfan.sys in Alfredo Milani Comparetti SpeedFan 4.33, when used on Microsoft Windows Vista x64, allows local users to read or write arbitrary MSRs, and gain privileges and load unsigned drivers, via the (1) IOCTL_RDMSR 0x9C402438 and (2) IOCTL_WRMSR 0x9C40243C IOCTLs to \\Device\\speedfan, as demonstrated by an IOCTL_WRMSR action on MSR_LSTAR." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "speedfan-ioctl-privilege-escalation(37298)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37298" }, { "name": "41842", "refsource": "OSVDB", "url": "http://osvdb.org/41842" }, { "name": "http://www.reversemode.com/index.php?option=com_content\u0026task=view\u0026id=42\u0026Itemid=1", "refsource": "MISC", "url": "http://www.reversemode.com/index.php?option=com_content\u0026task=view\u0026id=42\u0026Itemid=1" }, { "name": "26123", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26123" }, { "name": "27312", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27312" }, { "name": "http://www.bugtrack.almico.com/view.php?id=987", "refsource": "CONFIRM", "url": "http://www.bugtrack.almico.com/view.php?id=987" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5633", "datePublished": "2007-10-23T17:00:00", "dateReserved": "2007-10-23T00:00:00", "dateUpdated": "2024-08-07T15:39:13.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-5633\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-10-23T17:46:00.000\",\"lastModified\":\"2017-07-29T01:33:46.647\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Speedfan.sys in Alfredo Milani Comparetti SpeedFan 4.33, when used on Microsoft Windows Vista x64, allows local users to read or write arbitrary MSRs, and gain privileges and load unsigned drivers, via the (1) IOCTL_RDMSR 0x9C402438 and (2) IOCTL_WRMSR 0x9C40243C IOCTLs to \\\\Device\\\\speedfan, as demonstrated by an IOCTL_WRMSR action on MSR_LSTAR.\"},{\"lang\":\"es\",\"value\":\"Speedfan.sys en Alfredo Milani Comparetti SpeedFan 4.33, uando es utilizado sobre Microsoft Windows Vista x64, permite a usuarios locales leer o escribit MSRs de su elecci\u00f3n, y ganar privilegios y cargar controladores no asignados, a trav\u00e9s de (1) IOCTL_RDMSR 0x9C402438 y (2) IOCTL_WRMSR 0x9C40243C IOCTLs en \\\\Device\\\\speedfan, como se demostr\u00f3 por la acci\u00f3n IOCTL_WRMSR sobre MSR_LSTAR.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.2},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*\",\"matchCriteriaId\":\"1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:almico:speedfan:4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86F1246E-9247-4445-8DA8-09D6F6367B7C\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/41842\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/27312\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.bugtrack.almico.com/view.php?id=987\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.reversemode.com/index.php?option=com_content\u0026task=view\u0026id=42\u0026Itemid=1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/26123\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/37298\",\"source\":\"cve@mitre.org\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.