Executive Summary
Summary | |
---|---|
Title | Vulnerability in Windows Local Procedure Call Could Cause Elevation of Privilege (2360937) |
Informations | |||
---|---|---|---|
Name | MS10-084 | First vendor Publication | 2010-10-12 |
Vendor | Microsoft | Last vendor Modification | 2010-10-12 |
Severity (Vendor) | Important | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.0 (October 12, 2010): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. This security update is rated Important for all supported editions of Windows XP and Windows Server 2003. All supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are not affected by the vulnerability. For more information, see the subsection, Affected and Non-Affected Software, in this section. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS10-084.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:7175 | |||
Oval ID: | oval:org.mitre.oval:def:7175 | ||
Title: | LPC Message Buffer Overrun Vulnerability | ||
Description: | Stack-based buffer overflow in the Remote Procedure Call Subsystem (RPCSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted LPC message that requests an LRPC connection from an LPC server to a client, aka "LPC Message Buffer Overrun Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-3222 | Version: | 3 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2010-10-13 | Name : Windows Local Procedure Call Privilege Elevation Vulnerability (2360937) File : nvt/secpod_ms10-084.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
68586 | Microsoft Windows LRPC Server LPC Message Handling Local Privilege Escalation Microsoft Windows is prone to an overflow condition. The Remote Procedure Call Subsystem fails to properly sanitize user-supplied input resulting in a stack-based buffer overflow. With a specially crafted crafted LPC message, a local authenticated attacker can potentially gain elevated privileges. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-10-13 | Name : Arbitrary code can be executed on the remote host through its LRPC facility. File : smb_nt_ms10-084.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-26 23:01:49 |
|
2014-02-17 11:46:45 |
|