Executive Summary
Summary | |
---|---|
Title | Vulnerability in COM Validation in Windows Shell and WordPad Could Allow Remote Code Execution (2405882) |
Informations | |||
---|---|---|---|
Name | MS10-083 | First vendor Publication | 2010-10-12 |
Vendor | Microsoft | Last vendor Modification | 2010-12-14 |
Severity (Vendor) | Important | Revision | 2.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V2.0 (December 14, 2010): Added an update FAQ to announce an additional update for Windows Vista Service Pack 2 (KB979688) for users who have installed Windows Search 4.0 on Windows Vista Service Pack 1, then installed the security update offered in KB2405882, and then migrated to Windows Vista Service Pack 2. Customers in this scenario will need to install the new update offered in KB2405882 to be protected against the vulnerabilities described in this bulletin.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted file using WordPad or selects or opens a shortcut file that is on a network or WebDAV share. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS10-083.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:7286 | |||
Oval ID: | oval:org.mitre.oval:def:7286 | ||
Title: | COM Validation Vulnerability | ||
Description: | Windows Shell and WordPad in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7; Microsoft Office XP SP3; Office 2003 SP3; and Office System 2007 SP1 and SP2 do not properly validate COM objects during instantiation, which allows remote attackers to execute arbitrary code via a crafted file, aka "COM Validation Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1263 | Version: | 26 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Office XP Microsoft Excel 2003 Microsoft PowerPoint 2003 Microsoft Publisher 2003 Microsoft Visio 2003 Microsoft Word 2003 Microsoft Excel 2007 Microsoft PowerPoint 2007 Microsoft Publisher 2007 Microsoft Visio 2007 Microsoft Word 2007 Microsoft Wordpad |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
OpenVAS Exploits
Date | Description |
---|---|
2010-10-13 | Name : Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882) File : nvt/secpod_ms10-083.nasl |
2010-06-09 | Name : Microsoft Office COM Validation Remote Code Execution Vulnerability (983235) File : nvt/secpod_ms10-036.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
65219 | Microsoft Windows / Office COM Object Instantiation Validation Remote Code Ex... Microsoft Windows and Office fail to properly validate COM objects during instantiation. This may allow a context-dependent attacker to use a crafted file to execute arbitrary code. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-10-14 | IAVM : 2010-A-0134 - Microsoft Windows COM Validation Remote Code Execution Vulnerability Severity : Category II - VMSKEY : V0025530 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-09-19 | Microsoft Windows Media Player Firefox plugin memory corruption attempt RuleID : 54833 - Revision : 1 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media Player Firefox plugin memory corruption attempt RuleID : 17773 - Revision : 14 - Type : FILE-MULTIMEDIA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-10-13 | Name : The remote windows host is affected by a remote code execution vulnerability. File : smb_nt_ms10-083.nasl - Type : ACT_GATHER_INFO |
2010-06-09 | Name : Arbitrary code can be executed on the remote host through opening a Microsoft... File : smb_nt_ms10-036.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-09-19 21:22:56 |
|
2014-02-17 11:46:44 |
|
2014-01-19 21:30:33 |
|
2013-11-11 12:41:19 |
|