header-logo
Suggest Exploit
vendor:
Windows
by:
Andres Tarasco and I=F1aki Lopez
7.2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: Windows
Affected Version From: Windows 2000
Affected Version To: Windows 2003
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 2000, Windows XP, Windows 2003
2005

Microsoft Windows keybd_event validation vulnerability

Microsoft Windows is prone to a privilege escalation weakness. This issue is due to a design error when desktop applications handle keyboard events sent through the keybd_event() function. The specific issue is that programs may send keyboard events to higher privileged desktop applications. This poses a local security risk as malicious keyboard events may be sent to a desktop application such as 'explorer.exe' that is running as a higher privileged user. These keyboard events will be interpreted in the context of the target user. This issue could likely be abused after exploitation of a latent remote code execution vulnerability in a service to elevate privileges. In this scenario, a user with higher privileges than the service must be logged into the desktop.

Mitigation:

Ensure that all applications are running with the least privileges necessary and that all users are running with the least privileges necessary.
Source

Exploit-DB raw data: