{"vuid":"VU#119262","idnumber":"119262","name":"Microsoft Windows kernel fails to reset values in CPU data structures","keywords":["Microsoft","Windows","kernel","denial of service","DoS","CPU data structures","MS04-032","840987"],"overview":"A vulnerability in the Microsoft Windows kernel could allow an attacker to cause a denial-of-service condition.","clean_desc":"The Microsoft Windows kernel is responsible for handling processor resources and system services such as device and memory management. There is a vulnerability in the way the Windows kernel resets values in CPU data structures. Exploitation of this vulnerability could cause the system to stop responding.","impact":"A local, authenticated attacker could cause a denial-of-service condition.","resolution":"Apply Patch\nMicrosoft has provided a patch to address this vulnerability. For a list of affected versions and details on obtaining the patch, please refer to Microsoft Security Bulletin MS04-032.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Microsoft. Microsoft credits \nhlt\n for discovering the vulnerability.","author":"This document was written by Damon Morda and is based on information provided by Microsoft.","public":["http://www.microsoft.com/technet/security/bulletin/MS04-032.mspx","http://www.microsoft.com/technet/prodtechnol/winntas/training/ntarchitectoview/ntarc_2.mspx","http://securitytracker.com/alerts/2004/Oct/1011645.html","http://secunia.com/advisories/12804/"],"cveids":["CVE-2004-0211"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-10-12T20:01:54Z","publicdate":"2004-10-12T00:00:00Z","datefirstpublished":"2004-10-13T14:48:00Z","dateupdated":"2004-10-15T17:49:41Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"15","cam_population":"20","cam_impact":"3","cam_easeofexploitation":"7","cam_attackeraccessrequired":"10","cam_scorecurrent":"2.3625","cam_scorecurrentwidelyknown":"2.75625","cam_scorecurrentwidelyknownexploited":"4.33125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.3625,"vulnote":null}