MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886)

This script is Copyright (C) 2010-2017 Tenable Network Security, Inc.

Synopsis :

The remote host has multiple vulnerabilities in its TCP/IP

Description :

The TCP/IP stack installed on the remote Windows host is affected by
one or more of the following vulnerabilities :

- An error exists in the Windows TCP/IP stack when
processing specially crafted IPv6 packets with a
malformed extension header that could cause the
affected system to stop responding if IPv6 features are
enabled, which is true by default in Windows Vista and
2008. (CVE-2010-1892)

- The Windows TCP/IP stack fails to properly handle data
copied from user mode, which could result in an integer
overflow and allow a local attacker to run arbitrary
code with system-level privileges. (CVE-2010-1892)

See also :

Solution :

Microsoft has released a set of patches for Windows Vista, 2008, 7,
and 2008 R2.

Risk factor :

High / CVSS Base Score : 7.2
CVSS Temporal Score : 6.0
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 48295 ()

Bugtraq ID: 42251

CVE ID: CVE-2010-1892

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now