Executive Summary
Summary | |
---|---|
Title | Vulnerability in Windows Netlogon Service Could Allow Denial of Service (2207559) |
Informations | |||
---|---|---|---|
Name | MS10-101 | First vendor Publication | 2010-12-14 |
Vendor | Microsoft | Last vendor Modification | 2010-12-14 |
Severity (Vendor) | Important | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 5.4 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.0 (December 14, 2010): Bulletin published.Summary: This security update resolves a privately reported vulnerability in the Netlogon RPC Service on affected versions of Windows Server that are configured to serve as domain controllers. The vulnerability could allow denial of service if an attacker sends a specially crafted RPC packet to the Netlogon RPC Service interface on an affected system. An attacker requires administrator privileges on a machine that is joined to the same domain as the affected domain controller in order to exploit this vulnerability. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS10-101.mspx |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11963 | |||
Oval ID: | oval:org.mitre.oval:def:11963 | ||
Title: | Netlogon RPC Null dereference DOS Vulnerability | ||
Description: | The Netlogon RPC Service in Microsoft Windows Server 2003 SP2 and Server 2008 Gold, SP2, and R2, when the domain controller role is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and reboot) via a crafted RPC packet, aka "Netlogon RPC Null dereference DOS Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2742 | Version: | 8 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 5 |
OpenVAS Exploits
Date | Description |
---|---|
2010-12-15 | Name : Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559) File : nvt/secpod_ms10-101.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
69819 | Microsoft Windows Netlogon RPC Service Crafted Request Remote DoS Microsoft Windows contains a flaw that may allow a remote denial of service. The issue is triggered when a NULL-pointer dereference error in the Netlogon RPC Service of a domain controller occurs, and may be exploited via a specially crafted RPC packet to result in a loss of availability. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-12-16 | IAVM : 2010-B-0109 - Microsoft Windows Netlogon Denial of Service Vulnerability Severity : Category II - VMSKEY : V0025860 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | NETAPI RPC interface reboot attempt RuleID : 18215 - Revision : 9 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-12-15 | Name : The remote Windows host is affected by a denial of service vulnerability in t... File : smb_nt_ms10-101.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-26 23:02:21 |
|
2014-02-17 11:46:48 |
|
2014-01-19 21:30:34 |
|
2013-11-11 12:41:20 |
|