MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886)

high Nessus Plugin ID 48295


New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote host has multiple vulnerabilities in its TCP/IP implementation.


The TCP/IP stack installed on the remote Windows host is affected by one or more of the following vulnerabilities :

- An error exists in the Windows TCP/IP stack when processing specially crafted IPv6 packets with a malformed extension header that could cause the affected system to stop responding if IPv6 features are enabled, which is true by default in Windows Vista and 2008. (CVE-2010-1892)

- The Windows TCP/IP stack fails to properly handle data copied from user mode, which could result in an integer overflow and allow a local attacker to run arbitrary code with system-level privileges. (CVE-2010-1892)


Microsoft has released a set of patches for Windows Vista, 2008, 7, and 2008 R2.

See Also

Plugin Details

Severity: High

ID: 48295

File Name: smb_nt_ms10-058.nasl

Version: 1.20

Type: local

Agent: windows

Published: 8/11/2010

Updated: 11/15/2018

Dependencies: smb_hotfixes.nasl, ms_bulletin_checks_possible.nasl

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 8/10/2010

Vulnerability Publication Date: 8/10/2010

Reference Information

CVE: CVE-2010-1892, CVE-2010-1893

BID: 42251, 42254

MSFT: MS10-058

MSKB: 978886