Executive Summary
Summary | |
---|---|
Title | Vulnerabilities in Windows Kernel |
Informations | |||
---|---|---|---|
Name | MS10-048 | First vendor Publication | 2010-08-10 |
Vendor | Microsoft | Last vendor Modification | 2010-08-10 |
Severity (Vendor) | Important | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.0 (August 10, 2010): Bulletin published.Summary: This security update resolves one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS10-048.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
60 % | CWE-20 | Improper Input Validation |
40 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11020 | |||
Oval ID: | oval:org.mitre.oval:def:11020 | ||
Title: | Win32k Bounds Checking Vulnerability | ||
Description: | The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate an unspecified system-call argument, which allows local users to cause a denial of service (system hang) via a crafted application, aka "Win32k Bounds Checking Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1887 | Version: | 9 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11663 | |||
Oval ID: | oval:org.mitre.oval:def:11663 | ||
Title: | Win32k Window Creation Vulnerability (CVE-2010-1897) | ||
Description: | The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate pseudo-handle values in callback parameters during window creation, which allows local users to gain privileges via a crafted application, aka "Win32k Window Creation Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1897 | Version: | 9 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11769 | |||
Oval ID: | oval:org.mitre.oval:def:11769 | ||
Title: | Win32k Exception Handling Vulnerability | ||
Description: | The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, do not properly handle unspecified exceptions, which allows local users to gain privileges via a crafted application, aka "Win32k Exception Handling Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1894 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11844 | |||
Oval ID: | oval:org.mitre.oval:def:11844 | ||
Title: | Win32k Pool Overflow Vulnerability | ||
Description: | The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, do not properly perform memory allocation before copying user-mode data to kernel mode, which allows local users to gain privileges via a crafted application, aka "Win32k Pool Overflow Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1895 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:12006 | |||
Oval ID: | oval:org.mitre.oval:def:12006 | ||
Title: | Win32k User Input Validation Vulnerability | ||
Description: | The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, and Windows Server 2008 Gold and SP2 do not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Win32k User Input Validation Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1896 | Version: | 7 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2010-08-10 | Microsoft Windows CreateWindow Function Callback Vulnerability (MS10-048) |
OpenVAS Exploits
Date | Description |
---|---|
2010-08-11 | Name : Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (21... File : nvt/secpod_ms10-048.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
66983 | Microsoft Windows win32k.sys Driver xxxCreateWindowsEx hParent Value Handling... Microsoft Windows contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when the kernel-mode drivers in win32k.sys fail to properly validate pseudo-handle values in callback parameters during window creation, allowing a local authenticated attacker to gain full user privileges. |
66982 | Microsoft Windows win32k.sys Driver User Mode Input Unspecified Local Privile... Microsoft Windows contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when the kernel-mode drivers in win32k.sys fail to properly validate user-mode input passed to kernel mode, allowing a local authenticated attacker to gain full user privileges. |
66981 | Microsoft Windows win32k.sys Driver User Mode Copy Memory Allocation Local Pr... Microsoft Windows contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when win32k.sys fails to properly allocate memory when copying data from user mode, allowing a local authenticated attacker to cause a pool overflow and gain full user privileges. |
66980 | Microsoft Windows win32k.sys Driver Exception Handling Unspecified Local Priv... Microsoft Windows contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when the kernel-mode drivers in win32k.sys fail to properly handle certain exceptions, allowing a local, authenticated attacker to gain elevated privileges. |
66979 | Microsoft Windows win32k.sys Driver GreStretchBltInternal() Handling Local DoS Microsoft Windows contains a flaw that may allow a local, authenticated attacker to cause a denial of service. The issue is triggered when the 'hbmpItem' member of the 'MENUITEMINFO' structure in the 'xxxRealDrawMenuItem()' function is not properly validated, and will result in loss of availability for the platform. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-08-11 | Name : The Windows kernel is affected by several vulnerabilities that could allow es... File : smb_nt_ms10-048.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:46:37 |
|
2013-02-14 13:26:10 |
|