This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.
The Windows kernel is affected by multiple vulnerabilities that could
allow escalation of privileges.
The remote Windows host is running a version of the Windows kernel
that is affected by the following vulnerabilities :
- A reference count leak, which could result
in arbitrary code execution in the kernel.
- Kernel-mode drivers load unspecified keyboard
layers improperly, which could result in arbitrary
code execution in the kernel. (CVE-2010-2743)
- Kernel-mode drivers do not properly validate
unspecified window class data, which could
result in arbitrary code execution in the kernel.
See also :
Microsoft has released a set of patches for Windows 2003, XP, Vista,
2008, 7, and 2008 R2.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 6.0
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 49950 ()
Bugtraq ID: 412804377343774
CVE ID: CVE-2010-2549CVE-2010-2743CVE-2010-2744
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.