[Forgot Password]
Login  Register Subscribe

23631

 
 

126941

 
 

98250

 
 

909

 
 

79281

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-4398

Date: (C)2010-12-06   (M)2017-09-22 


Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction with Windows Kernel Vulnerability."

CVSS Score: 7.2Access Vector: LOCAL
Exploit Score: 3.9Access Complexity: LOW
Impact Score: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE





Reference:
SECTRACK-1025046
EXPLOIT-DB-15609
SECUNIA-42356
BID-45045
ADV-2011-0324
IAVM:2011-A-0022
MS11-011
VU#529673
http://isc.sans.edu/diary.html?storyid=9988
http://nakedsecurity.sophos.com/2010/11/25/new-windows-zero-day-flaw-bypasses-uac/
http://support.avaya.com/css/P8/documents/100127248
http://twitter.com/msftsecresponse/statuses/7590788200402945
http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/

CPE    9
cpe:/o:microsoft:windows_2003_server
cpe:/o:microsoft:windows_server_2008:::x32
cpe:/o:microsoft:windows_xp
cpe:/o:microsoft:windows_7
...
CWE    1
CWE-119
OVAL    2
oval:org.secpod.oval:def:90
oval:org.secpod.oval:def:1036

© 2013 SecPod Technologies