CVE-2007-5633 (GCVE-0-2007-5633)
Vulnerability from cvelistv5 – Published: 2007-10-23 17:00 – Updated: 2024-08-07 15:39
VLAI?
Summary
Speedfan.sys in Alfredo Milani Comparetti SpeedFan 4.33, when used on Microsoft Windows Vista x64, allows local users to read or write arbitrary MSRs, and gain privileges and load unsigned drivers, via the (1) IOCTL_RDMSR 0x9C402438 and (2) IOCTL_WRMSR 0x9C40243C IOCTLs to \Device\speedfan, as demonstrated by an IOCTL_WRMSR action on MSR_LSTAR.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T15:39:13.623Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "speedfan-ioctl-privilege-escalation(37298)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37298"
},
{
"name": "41842",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/41842"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.reversemode.com/index.php?option=com_content\u0026task=view\u0026id=42\u0026Itemid=1"
},
{
"name": "26123",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/26123"
},
{
"name": "27312",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27312"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.bugtrack.almico.com/view.php?id=987"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-10-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Speedfan.sys in Alfredo Milani Comparetti SpeedFan 4.33, when used on Microsoft Windows Vista x64, allows local users to read or write arbitrary MSRs, and gain privileges and load unsigned drivers, via the (1) IOCTL_RDMSR 0x9C402438 and (2) IOCTL_WRMSR 0x9C40243C IOCTLs to \\Device\\speedfan, as demonstrated by an IOCTL_WRMSR action on MSR_LSTAR."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "speedfan-ioctl-privilege-escalation(37298)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37298"
},
{
"name": "41842",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/41842"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.reversemode.com/index.php?option=com_content\u0026task=view\u0026id=42\u0026Itemid=1"
},
{
"name": "26123",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/26123"
},
{
"name": "27312",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27312"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.bugtrack.almico.com/view.php?id=987"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-5633",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Speedfan.sys in Alfredo Milani Comparetti SpeedFan 4.33, when used on Microsoft Windows Vista x64, allows local users to read or write arbitrary MSRs, and gain privileges and load unsigned drivers, via the (1) IOCTL_RDMSR 0x9C402438 and (2) IOCTL_WRMSR 0x9C40243C IOCTLs to \\Device\\speedfan, as demonstrated by an IOCTL_WRMSR action on MSR_LSTAR."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "speedfan-ioctl-privilege-escalation(37298)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37298"
},
{
"name": "41842",
"refsource": "OSVDB",
"url": "http://osvdb.org/41842"
},
{
"name": "http://www.reversemode.com/index.php?option=com_content\u0026task=view\u0026id=42\u0026Itemid=1",
"refsource": "MISC",
"url": "http://www.reversemode.com/index.php?option=com_content\u0026task=view\u0026id=42\u0026Itemid=1"
},
{
"name": "26123",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/26123"
},
{
"name": "27312",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27312"
},
{
"name": "http://www.bugtrack.almico.com/view.php?id=987",
"refsource": "CONFIRM",
"url": "http://www.bugtrack.almico.com/view.php?id=987"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-5633",
"datePublished": "2007-10-23T17:00:00",
"dateReserved": "2007-10-23T00:00:00",
"dateUpdated": "2024-08-07T15:39:13.623Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*\", \"matchCriteriaId\": \"1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:almico:speedfan:4.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86F1246E-9247-4445-8DA8-09D6F6367B7C\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Speedfan.sys in Alfredo Milani Comparetti SpeedFan 4.33, when used on Microsoft Windows Vista x64, allows local users to read or write arbitrary MSRs, and gain privileges and load unsigned drivers, via the (1) IOCTL_RDMSR 0x9C402438 and (2) IOCTL_WRMSR 0x9C40243C IOCTLs to \\\\Device\\\\speedfan, as demonstrated by an IOCTL_WRMSR action on MSR_LSTAR.\"}, {\"lang\": \"es\", \"value\": \"Speedfan.sys en Alfredo Milani Comparetti SpeedFan 4.33, uando es utilizado sobre Microsoft Windows Vista x64, permite a usuarios locales leer o escribit MSRs de su elecci\\u00f3n, y ganar privilegios y cargar controladores no asignados, a trav\\u00e9s de (1) IOCTL_RDMSR 0x9C402438 y (2) IOCTL_WRMSR 0x9C40243C IOCTLs en \\\\Device\\\\speedfan, como se demostr\\u00f3 por la acci\\u00f3n IOCTL_WRMSR sobre MSR_LSTAR.\"}]",
"id": "CVE-2007-5633",
"lastModified": "2024-11-21T00:38:21.337",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2007-10-23T17:46:00.000",
"references": "[{\"url\": \"http://osvdb.org/41842\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/27312\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.bugtrack.almico.com/view.php?id=987\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.reversemode.com/index.php?option=com_content\u0026task=view\u0026id=42\u0026Itemid=1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/26123\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/37298\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/41842\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/27312\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.bugtrack.almico.com/view.php?id=987\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.reversemode.com/index.php?option=com_content\u0026task=view\u0026id=42\u0026Itemid=1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/26123\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/37298\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2007-5633\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-10-23T17:46:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Speedfan.sys in Alfredo Milani Comparetti SpeedFan 4.33, when used on Microsoft Windows Vista x64, allows local users to read or write arbitrary MSRs, and gain privileges and load unsigned drivers, via the (1) IOCTL_RDMSR 0x9C402438 and (2) IOCTL_WRMSR 0x9C40243C IOCTLs to \\\\Device\\\\speedfan, as demonstrated by an IOCTL_WRMSR action on MSR_LSTAR.\"},{\"lang\":\"es\",\"value\":\"Speedfan.sys en Alfredo Milani Comparetti SpeedFan 4.33, uando es utilizado sobre Microsoft Windows Vista x64, permite a usuarios locales leer o escribit MSRs de su elecci\u00f3n, y ganar privilegios y cargar controladores no asignados, a trav\u00e9s de (1) IOCTL_RDMSR 0x9C402438 y (2) IOCTL_WRMSR 0x9C40243C IOCTLs en \\\\Device\\\\speedfan, como se demostr\u00f3 por la acci\u00f3n IOCTL_WRMSR sobre MSR_LSTAR.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*\",\"matchCriteriaId\":\"1DD1D5ED-FE7C-4ADF-B3AF-1F13E51B4FB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:almico:speedfan:4.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86F1246E-9247-4445-8DA8-09D6F6367B7C\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/41842\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/27312\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.bugtrack.almico.com/view.php?id=987\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.reversemode.com/index.php?option=com_content\u0026task=view\u0026id=42\u0026Itemid=1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/26123\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/37298\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/41842\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/27312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.bugtrack.almico.com/view.php?id=987\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.reversemode.com/index.php?option=com_content\u0026task=view\u0026id=42\u0026Itemid=1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/26123\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/37298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…