VID |
26538 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Hotfix (MS10-073, 981957) for 'Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege' has not been applied. This security update resolves several publicly disclosed vulnerabilities in the Windows kernel-mode drivers. The most severe of these vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users. The security update addresses the vulnerabilities by correcting the manner in which the Windows kernel-mode drivers maintain the reference count for an object, index a table of function pointers when loading a keyboard layout from disk, and validate window class data.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/Bulletin/MS10-073.mspx
* Platforms Affected: Windows XP SP3 Windows XP Professional x64 XP2 Windows Server 2003 SP2 Windows Server 2003 x64 SP2 Windows Server 2003 SP2 for Itanium-based Windows Vista SP1 and SP2 Windows Vista x64 SP1 and SP2 Windows Server 2008 and SP2 Windows Server 2008 x64 and SP2 Windows Server 2008 and SP2 for Itanium-based Windows 7 Windows 7 x64 Windows Server 2008 R2 x64 Windows Server 2008 R2 for Itanium-based |
Recommendation |
Apply the appropriate patch (981957) for your system, as listed in Microsoft Security Bulletin MS10-073 at http://www.microsoft.com/technet/security/bulletin/ms10-073.mspx |
Related URL |
CVE-2010-2549,CVE-2010-2743,CVE-2010-2744 (CVE) |
Related URL |
41280,43773,43774 (SecurityFocus) |
Related URL |
(ISS) |
|