[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-1897

Date: (C)2010-08-11   (M)2017-09-22
 
CVSS Score: 7.2Access Vector: LOCAL
Exploitability Subscore: 3.9Access Complexity: LOW
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate pseudo-handle values in callback parameters during window creation, which allows local users to gain privileges via a crafted application, aka "Win32k Window Creation Vulnerability."

Reference:
MS10-048
TA10-222A

CPE    21
cpe:/o:microsoft:windows_vista::sp1
cpe:/o:microsoft:windows_2003_server::sp2:itanium
cpe:/o:microsoft:windows_server_2008:::x32
cpe:/o:microsoft:windows_server_2003::sp2:x64
...
CWE    1
CWE-20
OVAL    2
oval:org.secpod.oval:def:1375
oval:org.mitre.oval:def:11663

© 2013 SecPod Technologies