FKIE_CVE-2005-1088

Vulnerability from fkie_nvd - Published: 2005-05-02 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in DameWare NT Utilities 4.8 and earlier, and Mini Remote Control 4.8 and earlier, allows local users to gain additional rights.
Impacted products
Vendor Product Version
dameware_development mini_remote_control 3.70
dameware_development mini_remote_control 3.71
dameware_development mini_remote_control 3.72
dameware_development mini_remote_control 3.73
dameware_development mini_remote_control 3.74
dameware_development mini_remote_control 4.0
dameware_development mini_remote_control 4.1
dameware_development mini_remote_control 4.2
dameware_development mini_remote_control 4.3
dameware_development mini_remote_control 4.4
dameware_development mini_remote_control 4.5
dameware_development mini_remote_control 4.6
dameware_development mini_remote_control 4.7
dameware_development mini_remote_control 4.8
dameware_development nt_utilities 3.0.0.0
dameware_development nt_utilities 3.1.0.0
dameware_development nt_utilities 3.2.0.0
dameware_development nt_utilities 3.21.0.0
dameware_development nt_utilities 3.41.0.0
dameware_development nt_utilities 3.42.0.0
dameware_development nt_utilities 3.43.0.0
dameware_development nt_utilities 3.44.0.0
dameware_development nt_utilities 3.45.0.0
dameware_development nt_utilities 3.46.0.0
dameware_development nt_utilities 3.48.0.0
dameware_development nt_utilities 3.49
dameware_development nt_utilities 3.50
dameware_development nt_utilities 3.51
dameware_development nt_utilities 3.60.0.0
dameware_development nt_utilities 3.61.0.0
dameware_development nt_utilities 3.62.0.0
dameware_development nt_utilities 3.63.0.0
dameware_development nt_utilities 3.64.0.0
dameware_development nt_utilities 3.65.0.0
dameware_development nt_utilities 3.66.0.0
dameware_development nt_utilities 3.67
dameware_development nt_utilities 3.68.0.0
dameware_development nt_utilities 3.69
dameware_development nt_utilities 3.70
dameware_development nt_utilities 3.71.0.0
dameware_development nt_utilities 3.72.0.0
dameware_development nt_utilities 3.73.0.0
dameware_development nt_utilities 3.74.0.0
dameware_development nt_utilities 4.0
dameware_development nt_utilities 4.1
dameware_development nt_utilities 4.2
dameware_development nt_utilities 4.3
dameware_development nt_utilities 4.4
dameware_development nt_utilities 4.5
dameware_development nt_utilities 4.6
dameware_development nt_utilities 4.7
dameware_development nt_utilities 4.8

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:3.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95DBA8A-9EE2-46A4-90A0-897585460670",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:3.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "7356897B-02DD-4A94-9F65-45006C123107",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:3.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ABB85C2-A80F-4E1A-8EEA-FFF541D2EEBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:3.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "187E7064-6F40-4EC1-81CF-C6E15FB18EAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:3.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0054519-E820-43F5-89B7-0BB9093C5D1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C8EDA9D-51EA-4B13-B9F8-B08D1FCC895B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC0C6BF-50D5-4D6D-8754-DF54C841D544",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5E32679-2226-478E-82E4-9B203CB08B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5069BDA-5744-4BBF-9B68-A6AB5D2CE79C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC9C0D3-FCB8-43A7-A9FC-F951468C5654",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF3E82D9-9B4D-4773-B01B-B6FCF2AB0E27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1B005EF-96FB-4DC8-9347-E48E61518D1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A6EA1E9-C7A0-45F0-BF0A-6D44CF6AE10F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:mini_remote_control:4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A83387-7F4C-4620-941D-D3DC2673523F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.0.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A09B69D7-E078-46FE-A6FA-D7C0D86D37F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F058DC6-8105-4BFD-BF0F-21E5F8BC15F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C8ADB3-4A41-4A17-BD41-8A05DEA11E90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.21.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4A253DC-F7DB-4798-9946-A984276DAAD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.41.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7E7FD9-52F2-4529-89B3-FB151ACD7001",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.42.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E94ACE08-8C30-40A6-A136-1130F5729A87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.43.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AA4F999-DDD0-4F83-9EB4-5CB957AFF91A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.44.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "009D0F11-8CC8-44A0-BD4A-F01411EA61BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.45.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D2DC98C-9FC7-4381-B846-955A94896F20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.46.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F0D64C0-BECC-44BA-8FC0-90EAAA43F3F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.48.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "220FF8F5-C54E-4BD7-8827-9B641236B3B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB088CDD-0F0C-4F96-A176-9197588169A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7CAC9CA-E3E8-465B-8312-D06AC74963F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "609CB21C-3D38-42A4-AE41-1C33D7FE5478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.60.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "71E9CAEA-0260-41AC-8457-F4B7DB4ABC5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.61.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D90F46-1785-4677-AE61-591E37230F81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.62.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD9694B8-3208-405D-AA7E-3EC654F39E8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.63.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8089AE52-1D23-4BF4-999A-45B7FC03C136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.64.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C056A6D2-AE6A-437F-B4CF-3834A46A3774",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.65.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "77999ED2-454A-45F4-B6DA-3E3849748349",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.66.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E56629-C8A1-42EC-BAD7-EC15D04BBA81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "F076D6C6-A978-4396-93D6-1CA95B381262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.68.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE9998D0-FADC-4023-87C4-D9030D4FDBAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA32F899-379D-43A9-92DC-835B02F6F068",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "80093105-CD58-4087-BFEA-FD111E7B585F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.71.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B976172-8278-45EA-ACBD-84B9FADC485A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.72.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "175C9EBA-AAF4-467A-B2CC-56D060D37DB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.73.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9152788-1552-465C-AC01-A1A0C0DA87DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:3.74.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD68458-6054-4A1F-AEFB-2DBABB13E6F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9EDD2C2-421C-4163-A9A2-2027DFFC50BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "623687A6-EA03-469F-A898-0033F7B8E969",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B818FC-9C3E-47A0-9D4D-A4990A3EB183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE0D9680-9ACC-4CF1-A4A0-1505ACA0AAC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D2A5CA9-4513-4DBA-AE82-CE9C9AC025C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD0788A-603F-4869-A51C-4FDAD48BFC6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C4DF201-0021-457C-AF1C-57D2FC3CFD31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DFCF89-B961-4B10-AE3F-E729E93954A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dameware_development:nt_utilities:4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3242F68B-11BC-4B6A-8D41-E16A4474BD26",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unknown vulnerability in DameWare NT Utilities 4.8 and earlier, and Mini Remote Control 4.8 and earlier, allows local users to gain additional rights."
    }
  ],
  "id": "CVE-2005-1088",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14829"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1013653"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.dameware.com/support/security/bulletin.asp?ID=SB5"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/18732"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/13023"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19997"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14829"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1013653"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.dameware.com/support/security/bulletin.asp?ID=SB5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/18732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/13023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19997"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…