MS10-066: Vulnerability in Remote Procedure Call Could Allow Remote Code Execution (982802)

high Nessus Plugin ID 49224

Language:

Synopsis

Arbitrary code can be executed on the remote host through its RPC facility.

Description

The RPC client implementation on the remote host has an unspecified memory corruption vulnerability. A specially crafted RPC response to a client-initiated RPC request can result in arbitrary code execution.

A malicious RPC server could exploit this to take complete control of the host.

Solution

Microsoft has released a set of patches for Windows XP and 2003.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2010/ms10-066

Plugin Details

Severity: High

ID: 49224

File Name: smb_nt_ms10-066.nasl

Version: 1.17

Type: local

Agent: windows

Published: 9/14/2010

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 9/14/2010

Vulnerability Publication Date: 9/14/2010

Reference Information

CVE: CVE-2010-2567

BID: 43119

MSFT: MS10-066

MSKB: 982802