MS10-048: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2160329)

High Nessus Plugin ID 48285


The Windows kernel is affected by several vulnerabilities that could allow escalation of privileges.


The remote Windows host is running a version of the Windows kernel that is affected by one or more of the following vulnerabilities :

- Improper valiation of an argument passed to a system call can result in a denial of service. (CVE-2010-1887)

- Certain unspecified exceptions are not properly handled which could result in arbitrary code execution in the kernel. (CVE-2010-1894)

- Memory is not properly allocated when making a copy from user mode, which could result in an elevation of privileges. (CVE-2010-1895)

- Unspecified input from user mode is not properly validated, which could result in arbitrary code execution in the kernel. (CVE-2010-1896)

- Unspecified parameters are not properly validated when creating a new window, which could result in arbitrary code execution in the kernel.


Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2.

See Also

Plugin Details

Severity: High

ID: 48285

File Name: smb_nt_ms10-048.nasl

Version: 1.21

Type: local

Agent: windows

Published: 2010/08/11

Updated: 2018/11/15

Dependencies: 57033, 13855

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/08/10

Vulnerability Publication Date: 2010/04/22

Exploitable With


Core Impact

Reference Information

CVE: CVE-2010-1887, CVE-2010-1894, CVE-2010-1895, CVE-2010-1896, CVE-2010-1897

BID: 39630, 42206, 42210, 42245, 42250

MSFT: MS10-048

MSKB: 2160329