Executive Summary

Informations
Name CVE-2010-1225 First vendor Publication 2010-04-01
Vendor Cve Last vendor Modification 2018-10-10

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The memory-management implementation in the Virtual Machine Monitor (aka VMM or hypervisor) in Microsoft Virtual PC 2007 Gold and SP1, Virtual Server 2005 Gold and R2 SP1, and Windows Virtual PC does not properly restrict access from the guest OS to memory locations in the VMM work area, which allows context-dependent attackers to bypass certain anti-exploitation protection mechanisms on the guest OS via crafted input to a vulnerable application. NOTE: the vendor reportedly found that only systems with an otherwise vulnerable application are affected, because "the memory areas accessible from the guest cannot be leveraged to achieve either remote code execution or elevation of privilege and ... no data from the host is exposed to the guest OS."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1225

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Application 2
Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
63522 Microsoft Virtual PC / Server Hypervisor Virtual Machine Monitor Memory Manag...

Virtual PC, Virtual Server and Windows Virtual PC contains a flaw that may allow an attacker to bypass anti-exploitation mechanisms on the guest OS. The issue is triggered when a malicious attacker sends specially crafted output to a vulnerable application.

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/38764
BUGTRAQ http://www.securityfocus.com/archive/1/510154/100/0/threaded
MISC http://www.coresecurity.com/content/virtual-pc-2007-hypervisor-memory-protect...
SECTRACK http://securitytracker.com/id?1023720

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2021-05-04 12:11:28
  • Multiple Updates
2021-04-22 01:11:57
  • Multiple Updates
2020-05-23 00:25:32
  • Multiple Updates
2018-10-11 00:19:50
  • Multiple Updates
2013-05-10 23:21:39
  • Multiple Updates