MS KB982316: Elevation of Privilege Using Windows Service Isolation Bypass

Medium Nessus Plugin ID 48761


The remote Windows host has a privilege escalation vulnerability.


Windows Service Isolation can be bypassed on the remote host, resulting in the elevation of privileges.

A local attacker could exploit this by leveraging the TAPI service to execute code as SYSTEM.

A similar problem affects other Windows services that run as the NetworkService user (e.g. IIS, SQL Server), though Nessus has not checked for those issues.


Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2 :

Although these patches mitigate this vulnerability, users should be aware this is considered a non-security update by Microsoft. Refer to the Microsoft advisory for more information.

See Also

Plugin Details

Severity: Medium

ID: 48761

File Name: smb_kb982316.nasl

Version: $Revision: 1.10 $

Type: local

Agent: windows

Family: Windows

Published: 2010/08/26

Modified: 2017/08/30

Dependencies: 13855

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/Registry/Enumerated, SMB/WindowsVersion

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/08/10

Vulnerability Publication Date: 2010/08/10

Reference Information

CVE: CVE-2010-1886

BID: 42278

OSVDB: 67083

MSKB: 982316