ID |
CVE-2010-2549
|
Summary |
Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Vista SP1 and SP2 and Server 2008 Gold and SP2 allows local users to gain privileges or cause a denial of service (system crash) by using a large number of calls to the NtUserCheckAccessForIntegrityLevel function to trigger a failure in the LockProcessByClientId function, leading to deletion of an in-use process object, aka "Win32k Reference Count Vulnerability." |
References |
|
Vulnerable Configurations |
-
cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
-
cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
|
CVSS |
Base: | 7.2 (as of 19-09-2017 - 01:31) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-399 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
msbulletin
via4
|
bulletin_id | MS10-073 | bulletin_url | | date | 2010-10-12T00:00:00 | impact | Elevation of Privilege | knowledgebase_id | 981957 | knowledgebase_url | | severity | Important | title | Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege |
|
oval
via4
|
accepted | 2014-03-03T04:00:18.897-05:00 | class | vulnerability | contributors | name | Josh Turpin | organization | Symantec Corporation |
name | Josh Turpin | organization | Symantec Corporation |
name | Maria Mikhno | organization | ALTX-SOFT |
| definition_extensions | comment | Microsoft Windows Vista (32-bit) Service Pack 1 is installed | oval | oval:org.mitre.oval:def:4873 |
comment | Microsoft Windows Server 2008 (32-bit) is installed | oval | oval:org.mitre.oval:def:4870 |
comment | Microsoft Windows Vista x64 Edition Service Pack 1 is installed | oval | oval:org.mitre.oval:def:5254 |
comment | Microsoft Windows Server 2008 (64-bit) is installed | oval | oval:org.mitre.oval:def:5356 |
comment | Microsoft Windows Server 2008 (ia-64) is installed | oval | oval:org.mitre.oval:def:5667 |
comment | Microsoft Windows Vista (32-bit) Service Pack 2 is installed | oval | oval:org.mitre.oval:def:6124 |
comment | Microsoft Windows Server 2008 x64 Edition Service Pack 2 is installed | oval | oval:org.mitre.oval:def:6216 |
comment | Microsoft Windows Server 2008 (32-bit) Service Pack 2 is installed | oval | oval:org.mitre.oval:def:5653 |
comment | Microsoft Windows Vista x64 Edition Service Pack 2 is installed | oval | oval:org.mitre.oval:def:5594 |
comment | Microsoft Windows Server 2008 Itanium-Based Edition Service Pack 2 is installed | oval | oval:org.mitre.oval:def:6150 |
| description | Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Vista SP1 and SP2 and Server 2008 Gold and SP2 allows local users to gain privileges or cause a denial of service (system crash) by using a large number of calls to the NtUserCheckAccessForIntegrityLevel function to trigger a failure in the LockProcessByClientId function, leading to deletion of an in-use process object, aka "Win32k Reference Count Vulnerability." | family | windows | id | oval:org.mitre.oval:def:12215 | status | accepted | submitted | 2010-08-10T13:00:00 | title | Win32k Reference Count Vulnerability | version | 80 |
|
refmap
via4
|
bid | 41280 | cert | TA10-285A | exploit-db | 14156 | fulldisc | 20100630 MSRC-001: Windows Vista/Server 2008 NtUserCheckAccessForIntegrityLevel Use-after-free Vulnerability | osvdb | 66003 | secunia | 40421 | xf | ms-win-ntusercheck-priv-escalation(60120) |
|
Last major update |
19-09-2017 - 01:31 |
Published |
02-07-2010 - 19:00 |
Last modified |
19-09-2017 - 01:31 |