Executive Summary

Summary
Title Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege (982799)
Informations
Name MS10-059 First vendor Publication 2010-08-10
Vendor Microsoft Last vendor Modification 2010-08-10
Severity (Vendor) Important Revision 1.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:S/C:C/I:C/A:C)
Cvss Base Score 6.8 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.1 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V1.0 (August 10, 2010): Bulletin published.Summary: This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in the Tracing Feature for Services. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users.

Original Source

Url : http://www.microsoft.com/technet/security/bulletin/MS10-059.mspx

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11426
 
Oval ID: oval:org.mitre.oval:def:11426
Title: Tracing Memory Corruption Vulnerability
Description: The Tracing Feature for Services in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly determine the length of strings in the registry, which allows local users to gain privileges or cause a denial of service (memory corruption) via vectors involving a long string, aka "Tracing Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-2555
Version: 7
Platform(s): Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:12082
 
Oval ID: oval:org.mitre.oval:def:12082
Title: Tracing Registry Key ACL Vulnerability
Description: The Tracing Feature for Services in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 has incorrect ACLs on its registry keys, which allows local users to gain privileges via vectors involving a named pipe and impersonation, aka "Tracing Registry Key ACL Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-2554
Version: 7
Platform(s): Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 8
Os 4

ExploitDB Exploits

id Description
2010-08-10 Microsoft Windows Tracing Registry Key ACL Privilege Escalation Vulnerability

OpenVAS Exploits

Date Description
2010-08-26 Name : Microsoft Windows Tracing Feature Privilege Elevation Vulnerabilities (982799)
File : nvt/secpod_ms10-059.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
66978 Microsoft Windows Tracing Feature for Services Registry String Handling Memor...

A memory corruption flaw exists in Microsoft Windows. The Tracing Feature for Services fails to sanitize user-supplied input, resulting in memory corruption. With a specially crafted overly long string, a local, authenticated attacker can gain full user privileges.
66977 Microsoft Windows Tracing Feature for Services Registry Key ACL Local Privile...

Microsoft Windows contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is triggered when Tracing Feature for Services fails to set secure permissions for registry keys, allowing a local authenticated attacker to gain full user privileges by editing subkeys in 'HKLM\Software\Microsoft\Tracing'.

Information Assurance Vulnerability Management (IAVM)

Date Description
2010-08-12 IAVM : 2010-B-0064 - Multiple Vulnerabilities in Microsoft Windows Tracing Feature for Services
Severity : Category I - VMSKEY : V0025074

Nessus® Vulnerability Scanner

Date Description
2010-08-11 Name : The remote Windows host has multiple privilege escalation vulnerabilities.
File : smb_nt_ms10-059.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 11:46:39
  • Multiple Updates
2013-11-11 12:41:18
  • Multiple Updates