Executive Summary
Summary | |
---|---|
Title | Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege (2440591) |
Informations | |||
---|---|---|---|
Name | MS10-099 | First vendor Publication | 2010-12-14 |
Vendor | Microsoft | Last vendor Modification | 2010-12-14 |
Severity (Vendor) | Important | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.0 (December 14, 2010): Bulletin published.Summary: This security update addresses a privately reported vulnerability in the Routing and Remote Access NDProxy component of Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS10-099.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12461 | |||
Oval ID: | oval:org.mitre.oval:def:12461 | ||
Title: | Kernel NDProxy Buffer Overflow Vulnerability | ||
Description: | Buffer overflow in the Routing and Remote Access NDProxy component in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, related to the Routing and Remote Access service (RRAS) and improper copying from user mode to the kernel, aka "Kernel NDProxy Buffer Overflow Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-3963 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2010-12-15 | Name : Routing and Remote Access Privilege Escalation Vulnerability (2440591) File : nvt/secpod_ms10-099.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
69823 | Microsoft Windows Routing and Remote Access NDProxy Unspecified Local Code Ex... Microsoft Windows is prone to an overflow condition. The Routing and Remote Access NDProxy component fails to properly sanitize user-supplied input resulting in a buffer overflow. With a specially crafted application, a local attacker can potentially gain elevated privileges and execute arbitrary code. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-12-16 | IAVM : 2010-A-0172 - Microsoft Windows Routing and Remote Access Privilege Escalation Vulnerability Severity : Category II - VMSKEY : V0025854 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-12-15 | Name : The Windows kernel is affected by a vulnerability that could allow escalation... File : smb_nt_ms10-099.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-26 23:02:20 |
|
2014-02-17 11:46:48 |
|
2013-11-11 12:41:20 |
|