Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "BE1A6107-DE00-4A1C-87FC-9E4015165B5B", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E53CDA8E-50A8-4509-B070-CCA5604FFB21", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*", "matchCriteriaId": "35346A7B-2CB5-446D-B0C3-1F21D71A746D", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise:*:*:*:*:*", "matchCriteriaId": "BBD9C514-5AF7-4849-A535-F0F3C9339051", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*", "matchCriteriaId": "089A953C-8446-4E6F-B506-430C38DF37B1", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_srv:*:*:*:*:*", "matchCriteriaId": "999C0DA9-7901-449A-AFD8-45EA95761DF5", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*", "matchCriteriaId": "416F06DD-980E-4A54-822D-CBA499FD1F86", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise:*:*:*:*:*", "matchCriteriaId": "B1CDE116-BFE5-47F9-8EA4-F6510A17CCFB", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*", "matchCriteriaId": "656AE014-AEEC-46E8-A696-61FEA7932F21", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_srv:*:*:*:*:*", "matchCriteriaId": "7AAAC4EA-75C1-4A55-B464-997FE1F1498D", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*", "matchCriteriaId": "A08D0EA1-DA1B-4C52-883A-3F156F032517", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise:*:*:*:*:*", "matchCriteriaId": "56094D8B-1049-475F-B6B8-BB9DA143DA95", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*", "matchCriteriaId": "93BA426E-DD51-44AC-BE78-3164670FF9E1", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_srv:*:*:*:*:*", "matchCriteriaId": "65D83EDB-C76C-4717-9659-759867C18548", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*", "matchCriteriaId": "02BE9817-E1AE-4619-8302-CA7AA4167F48", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise:*:*:*:*:*", "matchCriteriaId": "26557DD5-C8A2-4AE3-B135-23F8B5F11DF0", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*", "matchCriteriaId": "FBBBF25A-709B-4716-9894-AD82180091AD", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_srv:*:*:*:*:*", "matchCriteriaId": "6FAA4634-A7BB-450E-B62F-F9950AD29C1E", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*", "matchCriteriaId": "88B70B7A-5BCC-4626-AAC7-D1ACFF25D66E", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise:*:*:*:*:*", "matchCriteriaId": "306FC85F-9947-4721-B823-60733FA9E317", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*", "matchCriteriaId": "82781A72-A34F-4668-9EE8-C203B04E3367", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_srv:*:*:*:*:*", "matchCriteriaId": "4479F8EF-6D59-4D24-A56F-7F4034DE8483", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*", "matchCriteriaId": "12ED7363-6EEE-4688-A9B7-C5EB1107A7B4", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise:*:*:*:*:*", "matchCriteriaId": "DCC020E3-EA09-4E40-B607-8F0602B255BC", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*", "matchCriteriaId": "BCDFDBBA-6C4F-472A-9F4F-461C424794E7", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_srv:*:*:*:*:*", "matchCriteriaId": "A456E07C-401C-423E-897E-6465178C1732", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*", "matchCriteriaId": "EDDD8DA8-D074-4543-AEDF-F856B5567F21", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise:*:*:*:*:*", "matchCriteriaId": "D113B353-03B6-4821-9F83-25D88423C229", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*", "matchCriteriaId": "90CFA69B-7814-4F97-A14D-D76310065CF3", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*", "matchCriteriaId": "AB6ADBAF-6EB0-4CFA-9D33-A814AC20484E", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "matchCriteriaId": "BC176BB0-1655-4BEA-A841-C4158167CC9B", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:pro:*:*:*:*:*", "matchCriteriaId": "19DA594E-B495-4C5D-BC94-79582D3983C9", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*", "matchCriteriaId": "49693FA0-BF34-438B-AFF2-75ACC8A6D2E6", "vulnerable": true}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:sp1:pro:*:*:*:*:*", "matchCriteriaId": "E78E8FC4-9D64-4ADC-B318-55F4337B7EEC", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "NT Virtual DOS Machine (NTVDM.EXE) in Windows 2000, NT and XP does not verify user execution permissions for 16-bit executable files, which allows local users to bypass the loader and execute arbitrary programs."}, {"lang": "es", "value": "NT Virtual DOS Machine (NTVDM.EXE) en Windows 2000, NT y XP no verifica los permisos de ejecuci\u00f3n del usuario para archivos ejecutables de 16 bits, lo que permite a los usuarios locales pasar por alto el cargador y ejecutar programas arbitrarios."}], "id": "CVE-2002-2401", "lastModified": "2025-04-03T01:03:51.193", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2002-12-31T05:00:00.000", "references": [{"source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0211.html"}, {"source": "cve@mitre.org", "url": "http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3B319458"}, {"source": "cve@mitre.org", "url": "http://www.abtrusion.com/msexe16.asp"}, {"source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/10132.php"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/5740"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0211.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3B319458"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.abtrusion.com/msexe16.asp"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/10132.php"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/5740"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}