MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886)

This script is Copyright (C) 2010-2013 Tenable Network Security, Inc.


Synopsis :

The remote host has multiple vulnerabilities in its TCP/IP
implementation.

Description :

The TCP/IP stack installed on the remote Windows host is affected by
one or more of the following vulnerabilities :

- An error exists in the Windows TCP/IP stack when
processing specially crafted IPv6 packets with a
malformed extension header that could cause the
affected system to stop responding if IPv6 features are
enabled, which is true by default in Windows Vista and
2008. (CVE-2010-1892)

- The Windows TCP/IP stack fails to properly handle data
copied from user mode, which could result in an integer
overflow and allow a local attacker to run arbitrary
code with system-level privileges. (CVE-2010-1892)

See also :

http://technet.microsoft.com/en-us/security/bulletin/MS10-058

Solution :

Microsoft has released a set of patches for Windows Vista, 2008, 7,
and 2008 R2.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 48295 ()

Bugtraq ID: 42251
42254

CVE ID: CVE-2010-1892
CVE-2010-1893