Anfälligkeitssuche        Suche in 187964 CVE Beschreibungen
und 85075 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:
Titel:Microsoft Windows GP Trap Handler Privilege Escalation Vulnerability
Zusammenfassung:The host is installed with Microsoft Windows operating system and; is prone to Privilege Escalation Vulnerability.;; This NVT has been replaced by OID:
The host is installed with Microsoft Windows operating system and
is prone to Privilege Escalation Vulnerability.

This NVT has been replaced by OID:

Vulnerability Insight:
This issue is due to the kernel not properly handling certain
exceptions when setting up a VDM (Virtual DOS Machine) context, which
allows users to gain kernel privileges by setting up a crafted 'DM_TIB'
in their 'TEB' and reach the 'Ki386BiosCallReturnAddress()' function via
the '#GP trap handler (nt!KiTrap0D)'.

Vulnerability Impact:
Successful exploitation will allow remote attackers to bypass
certain security restrictions or can gain escalated privileges via specially crafted attack.

Affected Software/OS:
- Microsoft Windows XP Service Pack 3 and prior

- Microsoft Windows 2000 Service Pack 4 and prior

- Microsoft Windows Server 2003 Service Pack 2 and prior

No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:

CVSS Vector:

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-0232
BugTraq ID: 37864
Bugtraq: 20100119 Microsoft Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack (Google Search)
Cert/CC Advisory: TA10-040A
Microsoft Security Bulletin: MS10-015
XForce ISS Database: ms-win-gptrap-privilege-escalation(55742)
CopyrightCopyright (C) 2010 Greenbone Networks GmbH

Dies ist nur einer von 85075 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.