2024-04-04 08:46:00 +00:00

183 lines
6.1 KiB
JSON

{
"id": "CVE-2010-4398",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-12-06T13:44:54.863",
"lastModified": "2018-10-12T21:59:03.130",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-03-28",
"cisaActionDue": "2022-04-21",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Microsoft Windows Kernel Stack-Based Buffer Overflow Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka \"Driver Improper Interaction with Windows Kernel Vulnerability.\""
},
{
"lang": "es",
"value": "Desbordamiento de buffer basado en pila en la funci\u00f3n RtlQueryRegistryValues de win32k.sys de Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008 hasta la versi\u00f3n R2 y Windows 7. Permite a usuarios locales escalar privilegios y evitar el \"User Account Control\" (UAC), a trav\u00e9s de un valor REG_BINARY modificado de la clave del registro SystemDefaultEUDCFont."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60EC86B8-5C8C-4873-B364-FB1F8EFE1CFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D56B932B-9593-44E2-B610-E4EB2143EB21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"matchCriteriaId": "7F6EA111-A4E6-4963-A0C8-F9336C605B6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"matchCriteriaId": "9CFB1A97-8042-4497-A45D-C014B5E240AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"matchCriteriaId": "7F9C7616-658D-409D-8B53-AC00DC55602A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"matchCriteriaId": "CC916D5A-0644-4423-A52E-D4310906BE78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"matchCriteriaId": "95DC297F-06DB-4FB3-BFB6-7312C059E047"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E61F1C9B-44AF-4B35-A7B2-948EEF7639BD"
}
]
}
]
}
],
"references": [
{
"url": "http://isc.sans.edu/diary.html?storyid=9988",
"source": "cve@mitre.org"
},
{
"url": "http://nakedsecurity.sophos.com/2010/11/25/new-windows-zero-day-flaw-bypasses-uac/",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/42356",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://support.avaya.com/css/P8/documents/100127248",
"source": "cve@mitre.org"
},
{
"url": "http://twitter.com/msftsecresponse/statuses/7590788200402945",
"source": "cve@mitre.org"
},
{
"url": "http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.exploit-db.com/exploits/15609/",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/529673",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/45045",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1025046",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2011/0324",
"source": "cve@mitre.org"
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-011",
"source": "cve@mitre.org"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12162",
"source": "cve@mitre.org"
}
]
}