Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-0820 | First vendor Publication | 2010-09-15 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Heap-based buffer overflow in the Local Security Authority Subsystem Service (LSASS), as used in Active Directory in Microsoft Windows Server 2003 SP2 and Windows Server 2008 Gold, SP2, and R2; Active Directory Application Mode (ADAM) in Windows XP SP2 and SP3 and Windows Server 2003 SP2; and Active Directory Lightweight Directory Service (AD LDS) in Windows Vista SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, allows remote authenticated users to execute arbitrary code via malformed LDAP messages, aka "LSASS Heap Overflow Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0820 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:7120 | |||
Oval ID: | oval:org.mitre.oval:def:7120 | ||
Title: | LSASS Heap Overflow Vulnerability | ||
Description: | Heap-based buffer overflow in the Local Security Authority Subsystem Service (LSASS), as used in Active Directory in Microsoft Windows Server 2003 SP2 and Windows Server 2008 Gold, SP2, and R2; Active Directory Application Mode (ADAM) in Windows XP SP2 and SP3 and Windows Server 2003 SP2; and Active Directory Lightweight Directory Service (AD LDS) in Windows Vista SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, allows remote authenticated users to execute arbitrary code via malformed LDAP messages, aka "LSASS Heap Overflow Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0820 | Version: | 17 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 5 | |
Os | 1 | |
Os | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2010-09-15 | Name : MS Local Security Authority Subsystem Service Privilege Elevation Vulnerabili... File : nvt/secpod_ms10-068.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
67987 | Microsoft Windows LSASS Implementation Malformed LDAP Message Handling Remote... Microsoft Windows contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is caused due to an error in the Local Security Authority Subsystem Service (LSASS) within the implementations of Active Directory, Active Directory Application Mode (ADAM), and Active Directory Lightweight Directory Service (AD LDS). This can be exploited to cause a heap-based buffer overflow by sending a specially crafted LDAP message to an affected LSASS server. It can allow execution of arbitrary code, but requires authentication with the LSASS server. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows LSASS integer overflow attempt RuleID : 17249 - Revision : 8 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-09-14 | Name : The version of Active Directory on the remote Windows host can be used to exe... File : smb_nt_ms10-068.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 23:07:34 |
|
2024-11-28 12:21:20 |
|
2024-10-18 00:28:11 |
|
2024-08-02 12:13:15 |
|
2024-08-02 01:03:35 |
|
2024-02-02 01:12:51 |
|
2024-02-01 12:03:31 |
|
2023-12-07 21:28:04 |
|
2023-09-05 12:11:58 |
|
2023-09-05 01:03:22 |
|
2023-09-02 12:12:00 |
|
2023-09-02 01:03:25 |
|
2023-08-12 12:14:14 |
|
2023-08-12 01:03:24 |
|
2023-08-11 12:12:04 |
|
2023-08-11 01:03:32 |
|
2023-08-06 12:11:36 |
|
2023-08-06 01:03:26 |
|
2023-08-04 12:11:41 |
|
2023-08-04 01:03:27 |
|
2023-07-14 12:11:37 |
|
2023-07-14 01:03:25 |
|
2023-03-29 01:13:18 |
|
2023-03-28 12:03:31 |
|
2022-10-11 12:10:22 |
|
2022-10-11 01:03:14 |
|
2021-05-04 12:11:21 |
|
2021-04-22 01:11:47 |
|
2020-05-23 00:25:23 |
|
2019-02-26 17:19:33 |
|
2018-10-31 00:20:02 |
|
2018-10-13 00:22:55 |
|
2018-09-20 12:08:17 |
|
2017-09-19 09:23:40 |
|
2016-09-30 01:02:21 |
|
2016-08-31 12:02:05 |
|
2016-08-05 12:02:26 |
|
2016-06-28 18:04:17 |
|
2016-04-26 19:37:42 |
|
2014-02-17 10:54:11 |
|
2014-01-19 21:26:41 |
|
2013-05-10 23:19:37 |
|