MS10-032: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (979559)

high Nessus Plugin ID 46839
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 8.4

Synopsis

The Windows kernel is affected by several vulnerabilities that could allow escalation of privileges.

Description

The remote Windows host is running a version of the Windows kernel that is affected by one or more of the following vulnerabilities :

- Improper validation of changes in certain kernel objects may allow a local attacker to execute arbitrary code in kernel mode and take complete control of the affected system. (CVE-2010-0484)

- Improper validation of parameters when creating a new window may allow a local attacker to execute arbitrary code in kernel mode and take complete control of the affected system. (CVE-2010-0485)

- A vulnerability that arises in the way Windows provides glyph outline information to applications may allow a local attacker to execute arbitrary code in kernel mode and take complete control of the affected system.
(CVE-2010-1255)

Solution

Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista, 2008, 7, and 2008 R2.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2010/ms10-032

Plugin Details

Severity: High

ID: 46839

File Name: smb_nt_ms10-032.nasl

Version: 1.22

Type: local

Agent: windows

Published: 6/9/2010

Updated: 11/15/2018

Dependencies: 57033, 13855

Risk Information

Risk Factor: High

VPR Score: 8.4

CVSS v2.0

Base Score: 7.2

Temporal Score: 6

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/8/2010

Vulnerability Publication Date: 6/8/2010

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2010-0484, CVE-2010-0485, CVE-2010-1255

BID: 40508, 40569, 40570

MSFT: MS10-032

MSKB: 979559