ID |
CVE-2010-1893
|
Summary |
Integer overflow in the TCP/IP stack in Microsoft Windows Vista SP1, Windows Server 2008 Gold and R2, and Windows 7 allows local users to gain privileges via a buffer of user-mode data that is copied to kernel mode, aka "Integer Overflow in Windows Networking Vulnerability." |
References |
|
Vulnerable Configurations |
-
cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:*
|
CVSS |
Base: | 6.8 (as of 30-10-2018 - 16:27) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-189 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
SINGLE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:L/AC:L/Au:S/C:C/I:C/A:C
|
msbulletin
via4
|
bulletin_id | MS10-058 | bulletin_url | | date | 2010-08-10T00:00:00 | impact | Elevation of Privilege | knowledgebase_id | 978886 | knowledgebase_url | | severity | Important | title | Vulnerabilities in TCP/IP Could Allow Elevation of Privilege |
|
oval
via4
|
accepted | 2012-03-26T04:00:51.776-04:00 | class | vulnerability | contributors | name | Josh Turpin | organization | Symantec Corporation |
name | Dragos Prisaca | organization | Symantec Corporation |
| definition_extensions | comment | Microsoft Windows Vista (32-bit) Service Pack 1 is installed | oval | oval:org.mitre.oval:def:4873 |
comment | Microsoft Windows Vista x64 Edition Service Pack 1 is installed | oval | oval:org.mitre.oval:def:5254 |
comment | Microsoft Windows Server 2008 (32-bit) is installed | oval | oval:org.mitre.oval:def:4870 |
comment | Microsoft Windows Server 2008 (64-bit) is installed | oval | oval:org.mitre.oval:def:5356 |
comment | Microsoft Windows Server 2008 (ia-64) is installed | oval | oval:org.mitre.oval:def:5667 |
comment | Microsoft Windows 7 (32-bit) is installed | oval | oval:org.mitre.oval:def:6165 |
comment | Microsoft Windows 7 x64 Edition is installed | oval | oval:org.mitre.oval:def:5950 |
comment | Microsoft Windows Server 2008 R2 x64 Edition is installed | oval | oval:org.mitre.oval:def:6438 |
comment | Microsoft Windows Server 2008 R2 Itanium-Based Edition is installed | oval | oval:org.mitre.oval:def:5954 |
| description | Integer overflow in the TCP/IP stack in Microsoft Windows Vista SP1, Windows Server 2008 Gold and R2, and Windows 7 allows local users to gain privileges via a buffer of user-mode data that is copied to kernel mode, aka "Integer Overflow in Windows Networking Vulnerability." | family | windows | id | oval:org.mitre.oval:def:12087 | status | accepted | submitted | 2010-03-13T13:00:00 | title | Integer Overflow in Windows Networking Vulnerability | version | 48 |
|
refmap
via4
|
|
Last major update |
30-10-2018 - 16:27 |
Published |
11-08-2010 - 18:47 |
Last modified |
30-10-2018 - 16:27 |