MS10-093: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution (2424434)

High Nessus Plugin ID 51165


The remote Windows host is affected by a remote code execution vulnerability.


The remote Windows host is missing a security update. It is, therefore, affected by a flaw in Windows Movie Maker due to a failure to correctly restrict the path being used for loading external libraries. An unauthenticated, remote attacker can exploit this to execute arbitrary code with the user's privileges by convincing the user to open a specially crafted Windows Movie Maker (.mswmm) file that is located in the same network directory as a specially crafted dynamic link library (DLL) file.


Microsoft has released a set of patches for Windows Vista.

See Also

Plugin Details

Severity: High

ID: 51165

File Name: smb_nt_ms10-093.nasl

Version: $Revision: 1.25 $

Type: local

Agent: windows

Published: 2010/12/15

Modified: 2017/07/26

Dependencies: 57033, 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C


Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:microsoft:windows, cpe:/a:microsoft:windows_movie_maker

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/12/14

Vulnerability Publication Date: 2010/08/24

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-3967

BID: 42659

OSVDB: 67543

MSFT: MS10-093

EDB-ID: 14731

MSKB: 2424434