Executive Summary

Summary
Title Vulnerabilities in Windows Kernel
Informations
Name MS10-048 First vendor Publication 2010-08-10
Vendor Microsoft Last vendor Modification 2010-08-10
Severity (Vendor) Important Revision 1.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V1.0 (August 10, 2010): Bulletin published.Summary: This security update resolves one publicly disclosed and four privately reported vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users.

Original Source

Url : http://www.microsoft.com/technet/security/bulletin/MS10-048.mspx

CWE : Common Weakness Enumeration

% Id Name
60 % CWE-20 Improper Input Validation
40 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11020
 
Oval ID: oval:org.mitre.oval:def:11020
Title: Win32k Bounds Checking Vulnerability
Description: The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate an unspecified system-call argument, which allows local users to cause a denial of service (system hang) via a crafted application, aka "Win32k Bounds Checking Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-1887
Version: 9
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11663
 
Oval ID: oval:org.mitre.oval:def:11663
Title: Win32k Window Creation Vulnerability (CVE-2010-1897)
Description: The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate pseudo-handle values in callback parameters during window creation, which allows local users to gain privileges via a crafted application, aka "Win32k Window Creation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-1897
Version: 9
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11769
 
Oval ID: oval:org.mitre.oval:def:11769
Title: Win32k Exception Handling Vulnerability
Description: The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, do not properly handle unspecified exceptions, which allows local users to gain privileges via a crafted application, aka "Win32k Exception Handling Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-1894
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11844
 
Oval ID: oval:org.mitre.oval:def:11844
Title: Win32k Pool Overflow Vulnerability
Description: The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, and Windows Server 2003 SP2, do not properly perform memory allocation before copying user-mode data to kernel mode, which allows local users to gain privileges via a crafted application, aka "Win32k Pool Overflow Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-1895
Version: 3
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:12006
 
Oval ID: oval:org.mitre.oval:def:12006
Title: Win32k User Input Validation Vulnerability
Description: The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, and Windows Server 2008 Gold and SP2 do not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Win32k User Input Validation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-1896
Version: 7
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 2
Os 2
Os 1
Os 8
Os 3
Os 2

ExploitDB Exploits

id Description
2010-08-10 Microsoft Windows CreateWindow Function Callback Vulnerability (MS10-048)

OpenVAS Exploits

Date Description
2010-08-11 Name : Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (21...
File : nvt/secpod_ms10-048.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
66983 Microsoft Windows win32k.sys Driver xxxCreateWindowsEx hParent Value Handling...

Microsoft Windows contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when the kernel-mode drivers in win32k.sys fail to properly validate pseudo-handle values in callback parameters during window creation, allowing a local authenticated attacker to gain full user privileges.
66982 Microsoft Windows win32k.sys Driver User Mode Input Unspecified Local Privile...

Microsoft Windows contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when the kernel-mode drivers in win32k.sys fail to properly validate user-mode input passed to kernel mode, allowing a local authenticated attacker to gain full user privileges.
66981 Microsoft Windows win32k.sys Driver User Mode Copy Memory Allocation Local Pr...

Microsoft Windows contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when win32k.sys fails to properly allocate memory when copying data from user mode, allowing a local authenticated attacker to cause a pool overflow and gain full user privileges.
66980 Microsoft Windows win32k.sys Driver Exception Handling Unspecified Local Priv...

Microsoft Windows contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when the kernel-mode drivers in win32k.sys fail to properly handle certain exceptions, allowing a local, authenticated attacker to gain elevated privileges.
66979 Microsoft Windows win32k.sys Driver GreStretchBltInternal() Handling Local DoS

Microsoft Windows contains a flaw that may allow a local, authenticated attacker to cause a denial of service. The issue is triggered when the 'hbmpItem' member of the 'MENUITEMINFO' structure in the 'xxxRealDrawMenuItem()' function is not properly validated, and will result in loss of availability for the platform.

Nessus® Vulnerability Scanner

Date Description
2010-08-11 Name : The Windows kernel is affected by several vulnerabilities that could allow es...
File : smb_nt_ms10-048.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 11:46:37
  • Multiple Updates
2013-02-14 13:26:10
  • Multiple Updates