MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886)

high Nessus Plugin ID 48295

Language:

Synopsis

The remote host has multiple vulnerabilities in its TCP/IP implementation.

Description

The TCP/IP stack installed on the remote Windows host is affected by one or more of the following vulnerabilities :

- An error exists in the Windows TCP/IP stack when processing specially crafted IPv6 packets with a malformed extension header that could cause the affected system to stop responding if IPv6 features are enabled, which is true by default in Windows Vista and 2008. (CVE-2010-1892)

- The Windows TCP/IP stack fails to properly handle data copied from user mode, which could result in an integer overflow and allow a local attacker to run arbitrary code with system-level privileges. (CVE-2010-1892)

Solution

Microsoft has released a set of patches for Windows Vista, 2008, 7, and 2008 R2.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2010/ms10-058

Plugin Details

Severity: High

ID: 48295

File Name: smb_nt_ms10-058.nasl

Version: 1.20

Type: local

Agent: windows

Published: 8/11/2010

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 8/10/2010

Vulnerability Publication Date: 8/10/2010

Reference Information

CVE: CVE-2010-1892, CVE-2010-1893

BID: 42251, 42254

MSFT: MS10-058

MSKB: 978886