Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-2568 | First vendor Publication | 2010-07-22 |
Vendor | Cve | Last vendor Modification | 2025-02-04 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 7.8 | ||
Base Score | 7.8 | Environmental Score | 7.8 |
impact SubScore | 5.9 | Temporal Score | 7.8 |
Exploitabality Sub Score | 1.8 | ||
Attack Vector | Local | Attack Complexity | Low |
Privileges Required | None | User Interaction | Required |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2568 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11564 | |||
Oval ID: | oval:org.mitre.oval:def:11564 | ||
Title: | Windows Shell Vulnerability | ||
Description: | Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2568 | Version: | 9 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 4 | |
Os | 2 | |
Os | 2 |
SAINT Exploits
Description | Link |
---|---|
Windows Shell LNK file CONTROL item command execution | More info here |
ExploitDB Exploits
id | Description |
---|---|
2010-09-21 | Microsoft Windows Shell LNK Code Execution |
OpenVAS Exploits
Date | Description |
---|---|
2010-08-04 | Name : Microsoft Windows Shell Remote Code Execution Vulnerability (2286198) File : nvt/secpod_ms10-046.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
66387 | Microsoft Windows Shell LNK File Parsing Arbitrary Command Execution Windows contains a flaw that may allow an attacker to execute arbitrary code. The issue is triggered by a specially crafted .LNK or .PIF shortcut file which contains an icon resource that points to a malicious DLL file. |
Snort® IPS/IDS
Date | Description |
---|---|
2015-07-13 | Win.Trojan.Fanny outbound connection RuleID : 34857 - Revision : 2 - Type : MALWARE-CNC |
2014-01-10 | DNS request for known malware domain level4-co1-as30912.su RuleID : 28067 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | DNS request for known malware domain level4-co2-as30938.su RuleID : 28066 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | DNS request for known malware domain x2v9.com RuleID : 28065 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | DNS request for known malware domain intelbackupsrv.su RuleID : 28064 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | DNS request for known malware domain intelsystems.su RuleID : 28063 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | DNS request for known malware domain intelsecurity.su RuleID : 28062 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | DNS request for known malware domain intelcore.su RuleID : 28061 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | Microsoft LNK shortcut arbitrary dll load attempt RuleID : 24500 - Revision : 6 - Type : FILE-OTHER |
2014-01-10 | Microsoft LNK shortcut download attempt RuleID : 19291 - Revision : 4 - Type : NETBIOS |
2014-01-10 | Microsoft LNK shortcut arbitary dll load attempt RuleID : 19290 - Revision : 9 - Type : FILE-OTHER |
2014-01-10 | Microsoft Windows PIF shortcut file download request RuleID : 17043 - Revision : 9 - Type : FILE-IDENTIFY |
2014-01-10 | Microsoft LNK shortcut arbitrary dll load attempt RuleID : 17042 - Revision : 17 - Type : FILE-OTHER |
Metasploit Database
id | Description |
---|---|
2021-01-25 | FannyBMP or DementiaWheel Detection Registry Check |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-08-02 | Name : The remote windows host is affected by a remote code execution vulnerability. File : smb_nt_ms10-046.nasl - Type : ACT_GATHER_INFO |
2010-07-18 | Name : It may be possible to execute arbitrary code on the remote Windows host using... File : smb_kb_2286198.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-02-05 00:21:48 |
|
2024-12-19 21:21:26 |
|
2024-11-28 23:08:01 |
|
2024-11-28 12:22:20 |
|
2024-06-28 21:27:59 |
|
2024-02-02 01:13:35 |
|
2024-02-01 12:03:43 |
|
2023-12-07 21:28:04 |
|
2023-09-05 12:12:39 |
|
2023-09-05 01:03:34 |
|
2023-09-02 12:12:42 |
|
2023-09-02 01:03:37 |
|
2023-08-12 12:15:05 |
|
2023-08-12 01:03:36 |
|
2023-08-11 12:12:45 |
|
2023-08-11 01:03:44 |
|
2023-08-06 12:12:16 |
|
2023-08-06 01:03:38 |
|
2023-08-04 12:12:21 |
|
2023-08-04 01:03:39 |
|
2023-07-14 12:12:17 |
|
2023-07-14 01:03:37 |
|
2023-03-29 01:14:04 |
|
2023-03-28 12:03:43 |
|
2022-10-11 12:10:58 |
|
2022-10-11 01:03:24 |
|
2021-05-04 12:11:52 |
|
2021-04-22 01:12:22 |
|
2021-01-25 21:23:09 |
|
2020-05-23 13:16:55 |
|
2020-05-23 00:26:04 |
|
2019-02-26 17:19:33 |
|
2018-10-31 00:20:05 |
|
2018-10-13 00:22:58 |
|
2018-09-20 12:08:24 |
|
2018-05-16 09:19:30 |
|
2017-09-19 09:23:50 |
|
2016-09-30 01:02:28 |
|
2016-08-31 12:02:11 |
|
2016-08-05 12:02:32 |
|
2016-06-28 18:15:19 |
|
2016-04-26 19:56:21 |
|
2015-07-13 21:26:55 |
|
2015-03-12 17:22:32 |
|
2014-02-17 10:56:17 |
|
2014-01-19 21:26:56 |
|
2013-05-10 23:28:26 |
|