This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The Windows kernel is affected by several vulnerabilities that could
allow escalation of privileges.
The remote Windows host is running a version of the Windows kernel
that is affected by one or more of the following vulnerabilities :
- A race condition when creating certain types of kernel
threads may allow a local attacker to execute arbitrary
code in kernel mode and take complete control of the
affected system. (CVE-2010-1888)
- A double free vulnerability when the kernel initializes
objects while handling certain errors may allow a local
attacker to execute arbitrary code in kernel mode and
take complete control of the affected system.
- A failure to properly validate access control lists on
kernel objects may allow a local attacker to cause the
system to become unresponsive and automatically
See also :
Microsoft has released a set of patches for Windows XP, Vista, 2008,
7, and 2008 R2.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 6.0
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 48284 ()
Bugtraq ID: 422114221342221
CVE ID: CVE-2010-1888CVE-2010-1889CVE-2010-1890
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.