[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2010-4398

Date: (C)2010-12-06   (M)2017-09-22
 
CVSS Score: 7.2Access Vector: LOCAL
Exploitability Subscore: 3.9Access Complexity: LOW
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction with Windows Kernel Vulnerability."

Reference:
SECTRACK-1025046
EXPLOIT-DB-15609
SECUNIA-42356
BID-45045
ADV-2011-0324
IAVM:2011-A-0022
MS11-011
VU#529673
http://isc.sans.edu/diary.html?storyid=9988
http://nakedsecurity.sophos.com/2010/11/25/new-windows-zero-day-flaw-bypasses-uac/
http://support.avaya.com/css/P8/documents/100127248
http://twitter.com/msftsecresponse/statuses/7590788200402945
http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/

CPE    9
cpe:/o:microsoft:windows_server_2008:::x32
cpe:/o:microsoft:windows_server_2008:r2::itanium
cpe:/o:microsoft:windows_server_2008:::x64
cpe:/o:microsoft:windows_server_2008:::itanium
...
CWE    1
CWE-119
OVAL    2
oval:org.secpod.oval:def:90
oval:org.secpod.oval:def:1036

© 2013 SecPod Technologies