MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886)

High Nessus Plugin ID 48295


The remote host has multiple vulnerabilities in its TCP/IP implementation.


The TCP/IP stack installed on the remote Windows host is affected by one or more of the following vulnerabilities :

- An error exists in the Windows TCP/IP stack when processing specially crafted IPv6 packets with a malformed extension header that could cause the affected system to stop responding if IPv6 features are enabled, which is true by default in Windows Vista and 2008. (CVE-2010-1892)

- The Windows TCP/IP stack fails to properly handle data copied from user mode, which could result in an integer overflow and allow a local attacker to run arbitrary code with system-level privileges. (CVE-2010-1892)


Microsoft has released a set of patches for Windows Vista, 2008, 7, and 2008 R2.

See Also

Plugin Details

Severity: High

ID: 48295

File Name: smb_nt_ms10-058.nasl

Version: 1.20

Type: local

Agent: windows

Published: 2010/08/11

Updated: 2018/11/15

Dependencies: 13855, 57033

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2010/08/10

Vulnerability Publication Date: 2010/08/10

Reference Information

CVE: CVE-2010-1892, CVE-2010-1893

BID: 42251, 42254

MSFT: MS10-058

MSKB: 978886