[Forgot Password]
Login  Register Subscribe

24547

 
 

132763

 
 

126291

 
 

909

 
 

105100

 
 

152

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2010-4398Date: (C)2010-12-06   (M)2018-02-19


Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction with Windows Kernel Vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.2
Exploit Score: 3.9
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1025046
EXPLOIT-DB-15609
SECUNIA-42356
BID-45045
ADV-2011-0324
IAVM:2011-A-0022
MS11-011
VU#529673
http://isc.sans.edu/diary.html?storyid=9988
http://nakedsecurity.sophos.com/2010/11/25/new-windows-zero-day-flaw-bypasses-uac/
http://support.avaya.com/css/P8/documents/100127248
http://twitter.com/msftsecresponse/statuses/7590788200402945
http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/

CPE    9
cpe:/o:microsoft:windows_server_2008:r2::x64
cpe:/o:microsoft:windows_server_2008:r2::itanium
cpe:/o:microsoft:windows_7
cpe:/o:microsoft:windows_server_2008:::x64
...
CWE    1
CWE-119
OVAL    2
oval:org.secpod.oval:def:90
oval:org.secpod.oval:def:1036

© SecPod Technologies