Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Windows TCP/IP stack security vulnerabilities
Published:11.08.2010
Source:
SecurityVulns ID:11056
Type:remote
Threat Level:
6/10
Description:DoS, privilege escalation.
Affected:MICROSOFT : Windows Vista
 MICROSOFT : Windows 2008 Server
 MICROSOFT : Windows 7
CVE:CVE-2010-1893 (Integer overflow in the TCP/IP stack in Microsoft Windows Vista SP1, Windows Server 2008 Gold and R2, and Windows 7 allows local users to gain privileges via a buffer of user-mode data that is copied to kernel mode, aka "Integer Overflow in Windows Networking Vulnerability.")
 CVE-2010-1892 (The TCP/IP stack in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly handle malformed IPv6 packets, which allows remote attackers to cause a denial of service (system hang) via multiple crafted packets, aka "IPv6 Memory Corruption Vulnerability.")
Original documentdocumentMICROSOFT, Microsoft Security Bulletin MS10-058 - Important Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886) (11.08.2010)
Files:Microsoft Security Bulletin MS10-058 - Important Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod