MS10-073: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (981957)

high Nessus Plugin ID 49950

Language:

Synopsis

The Windows kernel is affected by multiple vulnerabilities that could allow escalation of privileges.

Description

The remote Windows host is running a version of the Windows kernel that is affected by the following vulnerabilities :

- A reference count leak, which could result in arbitrary code execution in the kernel.
(CVE-2010-2549)

- Kernel-mode drivers load unspecified keyboard layers improperly, which could result in arbitrary code execution in the kernel. (CVE-2010-2743)

- Kernel-mode drivers do not properly validate unspecified window class data, which could result in arbitrary code execution in the kernel.
(CVE-2010-2744)

Solution

Microsoft has released a set of patches for Windows 2003, XP, Vista, 2008, 7, and 2008 R2.

See Also

https://seclists.org/fulldisclosure/2010/Jul/3

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2010/ms10-073

Plugin Details

Severity: High

ID: 49950

File Name: smb_nt_ms10-073.nasl

Version: 1.32

Type: local

Agent: windows

Published: 10/13/2010

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/12/2010

Vulnerability Publication Date: 6/30/2010

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2010-2549, CVE-2010-2743, CVE-2010-2744

BID: 41280, 43773, 43774

MSFT: MS10-073

MSKB: 981957