CVE-2008-1436

N/A Unknown
Published: April 21, 2008 Modified: April 23, 2026
View on NVD

Description

Microsoft Windows XP Professional SP2, Vista, and Server 2003 and 2008 does not properly assign activities to the (1) NetworkService and (2) LocalService accounts, which might allow context-dependent attackers to gain privileges by using one service process to capture a resource from a second service process that has a LocalSystem privilege-escalation ability, related to improper management of the SeImpersonatePrivilege user right, as originally reported for Internet Information Services (IIS), aka Token Kidnapping.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/29867
Source: secure@microsoft.com
Vendor Advisory
http://www.securityfocus.com/bid/28833
Source: secure@microsoft.com
http://www.securitytracker.com/id?1019904
Source: secure@microsoft.com
http://www.us-cert.gov/cas/techalerts/TA09-104A.html
Source: secure@microsoft.com
US Government Resource
http://www.vupen.com/english/advisories/2008/1264/references
Source: secure@microsoft.com
Vendor Advisory
http://www.vupen.com/english/advisories/2009/1026
Source: secure@microsoft.com
Vendor Advisory
https://www.exploit-db.com/exploits/6705
Source: secure@microsoft.com
http://isc.sans.org/diary.html?storyid=4306
Source: af854a3a-2127-422b-91ae-364da2661108
http://milw0rm.com/sploits/2008-Churrasco.zip
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29867
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.argeniss.com/research/Churrasco.zip
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.argeniss.com/research/TokenKidnapping.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.microsoft.com/technet/security/advisory/951306.mspx
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/491111/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/497168/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/28833
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1019904
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA09-104A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2008/1264/references
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2009/1026
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/41880
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/6705
Source: af854a3a-2127-422b-91ae-364da2661108

40 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
57.9%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft