Win32k.sys (aka Graphics Device Interface (GDI)) in Windows 2000 and XP allows local users to cause a denial of service (system crash) by calling the ShowWindow function after receiving a WM_NCCREATE message.
Max CVSS
2.1
EPSS Score
0.08%
Published
2001-12-31
Updated
2019-04-30
RunAs (runas.exe) in Windows 2000 allows local users to create a spoofed named pipe when the service is stopped, then capture cleartext usernames and passwords when clients connect to the service. NOTE: the vendor disputes this issue, saying that administrative privileges are already required to exploit it
Max CVSS
3.6
EPSS Score
0.04%
Published
2001-12-31
Updated
2024-04-11
RunAs (runas.exe) in Windows 2000 only creates one session instance at a time, which allows local users to cause a denial of service (RunAs hang) by creating a named pipe session with the authentication server without any request for service. NOTE: the vendor disputes this vulnerability, however the vendor also presents a scenario in which other users could be affected if running on a Terminal Server. Therefore this is a vulnerability.
Max CVSS
2.1
EPSS Score
0.05%
Published
2001-12-31
Updated
2019-04-30
RunAs (runas.exe) in Windows 2000 stores cleartext authentication information in memory, which could allow attackers to obtain usernames and passwords by executing a process that is allocated the same memory page after termination of a RunAs command. NOTE: the vendor disputes this issue, saying that administrative privileges are already required to exploit it, and the original researcher did not respond to requests for additional information
Max CVSS
2.1
EPSS Score
0.08%
Published
2001-12-31
Updated
2024-04-11
Macintosh clients, when using NT file system volumes on Windows 2000 SP1, create subdirectories and automatically modify the inherited NTFS permissions, which may cause the directories to have less restrictive permissions than intended.
Max CVSS
7.5
EPSS Score
11.43%
Published
2001-12-31
Updated
2024-01-25
By default, DNS servers on Windows NT 4.0 and Windows 2000 Server cache glue records received from non-delegated name servers, which allows remote attackers to poison the DNS cache via spoofed DNS responses.
Max CVSS
7.5
EPSS Score
1.63%
Published
2001-08-31
Updated
2024-02-08
Windows 2000 allows local users to cause a denial of service and possibly gain privileges by setting a hardware breakpoint that is handled using global debug registers, which could cause other processes to terminate due to an exception, and allow hijacking of resources such as named pipes.
Max CVSS
4.6
EPSS Score
0.05%
Published
2001-05-24
Updated
2019-04-30
The change password option in the Windows Security interface for Windows 2000 allows attackers to use the option to attempt to change passwords of other users on other systems or identify valid accounts by monitoring error messages, possibly due to a problem in the NetuserChangePassword function.
Max CVSS
2.1
EPSS Score
0.13%
Published
2001-07-18
Updated
2019-04-30
Windows 2000 and Windows NT allows local users to cause a denial of service (reboot) by executing a command at the command prompt and pressing the F7 and enter keys several times while the command is executing, possibly related to an exception handling error in csrss.exe.
Max CVSS
2.1
EPSS Score
0.13%
Published
2001-07-27
Updated
2019-04-30
Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process.
Max CVSS
5.0
EPSS Score
1.18%
Published
2001-07-07
Updated
2018-10-30
Task Manager in Windows 2000 does not allow local users to end processes with uppercase letters named (1) winlogon.exe, (2) csrss.exe, (3) smss.exe and (4) services.exe via the Process tab which could allow local users to install Trojan horses that cannot be stopped with the Task Manager.
Max CVSS
7.8
EPSS Score
0.06%
Published
2001-07-16
Updated
2024-02-02
Windows 2000 allows remote attackers to cause a denial of service (CPU consumption) by flooding Internet Key Exchange (IKE) UDP port 500 with packets that contain a large number of dot characters.
Max CVSS
5.0
EPSS Score
33.56%
Published
2001-12-07
Updated
2017-10-10
Format string vulnerability in the C runtime functions in SQL Server 7.0 and 2000 allows attackers to cause a denial of service.
Max CVSS
5.0
EPSS Score
0.44%
Published
2001-12-20
Updated
2019-04-30
Terminal Services Manager MMC in Windows 2000 and XP trusts the Client Address (IP address) that is provided by the client instead of obtaining it from the packet headers, which allows clients to spoof their public IP address, e.g. through a Network Address Translation (NAT).
Max CVSS
7.5
EPSS Score
70.39%
Published
2001-12-06
Updated
2017-10-10
Terminal Server in Windows NT and Windows 2000 allows remote attackers to cause a denial of service via a sequence of invalid Remote Desktop Protocol (RDP) packets.
Max CVSS
5.0
EPSS Score
82.48%
Published
2001-12-06
Updated
2018-10-12
Buffer overflow in IrDA driver providing infrared data exchange on Windows 2000 allows attackers who are physically close to the machine to cause a denial of service (reboot) via a malformed IrDA packet.
Max CVSS
5.0
EPSS Score
0.86%
Published
2001-09-20
Updated
2018-10-12
Memory leak in NNTP service in Windows NT 4.0 and Windows 2000 allows remote attackers to cause a denial of service (memory exhaustion) via a large number of malformed posts.
Max CVSS
5.0
EPSS Score
0.60%
Published
2001-09-20
Updated
2020-04-02
Vulnerabilities in RPC servers in (1) Microsoft Exchange Server 2000 and earlier, (2) Microsoft SQL Server 2000 and earlier, (3) Windows NT 4.0, and (4) Windows 2000 allow remote attackers to cause a denial of service via malformed inputs.
Max CVSS
5.0
EPSS Score
0.39%
Published
2001-09-20
Updated
2020-04-02
Vulnerability in authentication process for SMTP service in Microsoft Windows 2000 allows remote attackers to use incorrect credentials to gain privileges and conduct activities such as mail relaying.
Max CVSS
7.5
EPSS Score
1.53%
Published
2001-08-14
Updated
2018-10-12
Running Windows 2000 LDAP Server over SSL, a function does not properly check the permissions of a user request when the directory principal is a domain user and the data attribute is the domain password, which allows local users to modify the login password of other users.
Max CVSS
4.6
EPSS Score
0.04%
Published
2001-07-21
Updated
2018-10-12
The default configuration of the Dr. Watson program in Windows NT and Windows 2000 generates user.dmp crash dump files with world-readable permissions, which could allow a local user to gain access to sensitive information.
Max CVSS
2.1
EPSS Score
0.05%
Published
2001-06-18
Updated
2017-10-10
Microsoft Windows 2000 telnet service allows a local user to make a certain system call that allows the user to terminate a Telnet session and cause a denial of service.
Max CVSS
2.1
EPSS Score
0.05%
Published
2001-07-21
Updated
2018-10-12
Microsoft Windows 2000 telnet service creates named pipes with predictable names and does not properly verify them, which allows local users to execute arbitrary commands by creating a named pipe with the predictable name and associating a malicious program with it, the second of two variants of this vulnerability.
Max CVSS
4.6
EPSS Score
0.05%
Published
2001-07-21
Updated
2018-10-12
Microsoft Windows 2000 telnet service creates named pipes with predictable names and does not properly verify them, which allows local users to execute arbitrary commands by creating a named pipe with the predictable name and associating a malicious program with it, the first of two variants of this vulnerability.
Max CVSS
7.2
EPSS Score
0.04%
Published
2001-07-21
Updated
2018-10-12
Microsoft Windows 2000 telnet service allows attackers to cause a denial of service (crash) via a long logon command that contains a backspace.
Max CVSS
5.0
EPSS Score
0.75%
Published
2001-07-21
Updated
2018-10-12
43 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!