Executive Summary
Summary | |
---|---|
Title | Vulnerability in Windows Client/Server Run |
Informations | |||
---|---|---|---|
Name | MS10-011 | First vendor Publication | 2010-02-09 |
Vendor | Microsoft | Last vendor Modification | 2010-06-09 |
Severity (Vendor) | Important | Revision | 1.2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 6.9 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.2 (June 9, 2010): Added a link to Microsoft Knowledge Base Article 978037 under Known Issues in the Executive Summary.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows Client/Server Run-time Subsystem (CSRSS). The vulnerability could allow elevation of privilege if an attacker logs on to the system and starts a specially crafted application designed to continue running after the attacker logs out. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited by anonymous users. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS10-011.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:8304 | |||
Oval ID: | oval:org.mitre.oval:def:8304 | ||
Title: | CSRSS Local Privilege Elevation Vulnerability | ||
Description: | The Client/Server Run-time Subsystem (CSRSS) in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly kill processes after a logout, which allows local users to obtain sensitive information or gain privileges via a crafted application that continues to execute throughout the logout of one user and the login session of the next user, aka "CSRSS Local Privilege Elevation Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0023 | Version: | 1 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 3 | |
Os | 3 |
OpenVAS Exploits
Date | Description |
---|---|
2010-02-10 | Name : Microsoft Client/Server Run-time Subsystem Privilege Elevation Vulnerability... File : nvt/secpod_ms10-011.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
62252 | Microsoft Windows Client/Server Run-time Subsystem (CSRSS) Session Terminatio... |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-02-09 | Name : Users can elevate their privileges on the remote host. File : smb_nt_ms10-011.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:46:28 |
|