CVE-2010-4398
KEV
🔴 Łataj teraz
Przepełnienie bufora w win32k.sys umożliwia lokalnym użytkownikom eskalację uprawnień.
CVSS
7.8
EPSS
8.9%
Exploit
weaponized
Vendor
microsoft
Opis źródłowy (NVD)
Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction with Windows Kernel Vulnerability."
buffer-overflow exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 8.9% |
| Opublikowano (NVD) | 2010-12-06 13:44:54 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 20:30:28 UTC |
Referencje
- http://isc.sans.edu/diary.html?storyid=9988 (cve@mitre.org) [Exploit, Issue Tracking]
- http://nakedsecurity.sophos.com/2010/11/25/new-windows-zero-day-flaw-bypasses-uac/ (cve@mitre.org) [Broken Link]
- http://secunia.com/advisories/42356 (cve@mitre.org) [Broken Link, Vendor Advisory]
- http://support.avaya.com/css/P8/documents/100127248 (cve@mitre.org) [Third Party Advisory]
- http://twitter.com/msftsecresponse/statuses/7590788200402945 (cve@mitre.org) [Not Applicable]
- http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/ (cve@mitre.org) [Broken Link, Exploit, Third Party Advisory, VDB Entry]
- http://www.exploit-db.com/exploits/15609/ (cve@mitre.org) [Exploit, Third Party Advisory, VDB Entry]
- http://www.kb.cert.org/vuls/id/529673 (cve@mitre.org) [Third Party Advisory, US Government Resource]
- http://www.securityfocus.com/bid/45045 (cve@mitre.org) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id?1025046 (cve@mitre.org) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.vupen.com/english/advisories/2011/0324 (cve@mitre.org) [Broken Link]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-011 (cve@mitre.org) [Patch, Vendor Advisory]
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12162 (cve@mitre.org) [Broken Link]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-4398 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]