Executive Summary

Informations
Name CVE-2010-1892 First vendor Publication 2010-08-11
Vendor Cve Last vendor Modification 2023-12-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 7.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The TCP/IP stack in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly handle malformed IPv6 packets, which allows remote attackers to cause a denial of service (system hang) via multiple crafted packets, aka "IPv6 Memory Corruption Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1892

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11845
 
Oval ID: oval:org.mitre.oval:def:11845
Title: IPv6 Memory Corruption Vulnerability
Description: The TCP/IP stack in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly handle malformed IPv6 packets, which allows remote attackers to cause a denial of service (system hang) via multiple crafted packets, aka "IPv6 Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-1892
Version: 5
Platform(s): Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 2
Os 8
Os 2

OpenVAS Exploits

Date Description
2010-08-26 Name : Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (978886)
File : nvt/secpod_ms10-058.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
67004 Microsoft Windows Malformed IPv6 Extension Header Handling Remote Memory Corr...

Microsoft Windows contains a flaw that may allow a local denial of service. The issue is triggered when an error in the TCP/IP stack can be exploited via a small number of IPv6 packets with specially crafted extension headers and it can cause a vulnerable system to stop responding.

Nessus® Vulnerability Scanner

Date Description
2010-08-11 Name : The remote host has multiple vulnerabilities in its TCP/IP implementation.
File : smb_nt_ms10-058.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CERT http://www.us-cert.gov/cas/techalerts/TA10-222A.html
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2023-12-07 21:28:04
  • Multiple Updates
2021-05-04 12:11:37
  • Multiple Updates
2021-04-22 01:12:13
  • Multiple Updates
2020-05-23 00:25:50
  • Multiple Updates
2018-10-31 00:20:04
  • Multiple Updates
2018-10-13 00:22:57
  • Multiple Updates
2017-09-19 09:23:48
  • Multiple Updates
2016-09-30 01:02:25
  • Multiple Updates
2016-08-31 12:02:09
  • Multiple Updates
2016-08-05 12:02:30
  • Multiple Updates
2016-06-28 18:11:10
  • Multiple Updates
2016-04-26 19:49:24
  • Multiple Updates
2014-02-17 10:55:33
  • Multiple Updates
2013-05-10 23:25:12
  • Multiple Updates