Vulnerabilities > CVE-2010-3144 - Unspecified vulnerability in Microsoft Windows Server 2003 and Windows XP
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Untrusted search path vulnerability in the Internet Connection Signup Wizard in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a Trojan horse smmscrpt.dll file in the current working directory, as demonstrated by a directory that contains an ISP or INS file, aka "Internet Connection Signup Wizard Insecure Library Loading Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 3 |
Exploit-Db
description | Microsoft Internet Connection Signup Wizard DLL Hijacking Exploit (smmscrpt.dll). CVE-2010-3144. Local exploit for windows platform |
file | exploits/windows/local/14754.txt |
id | EDB-ID:14754 |
last seen | 2016-02-01 |
modified | 2010-08-25 |
platform | windows |
port | |
published | 2010-08-25 |
reporter | Beenu Arora |
source | https://www.exploit-db.com/download/14754/ |
title | Microsoft Internet Connection Signup Wizard DLL Hijacking Exploit smmscrpt.dll |
type | local |
Msbulletin
bulletin_id | MS10-097 |
bulletin_url | |
date | 2010-12-14T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2443105 |
knowledgebase_url | |
severity | Important |
title | Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS10-097.NASL |
description | The remote Windows host contains a version of the Internet Connection Signup Wizard that incorrectly restricts the path used for loading external libraries. If an attacker can trick a user on the affected system into opening a specially crafted .ins or .isp file located in the same network directory as a specially crafted dynamic link library (DLL) file, he may be able to leverage this issue to execute arbitrary code subject to the user |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 51169 |
published | 2010-12-15 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/51169 |
title | MS10-097: Insecure Library Loading in Internet Connection Signup Wizard Could Allow Remote Code Execution (2443105) |
code |
|
Oval
accepted | 2011-01-24T04:00:12.536-05:00 | ||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||
contributors |
| ||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||
description | Untrusted search path vulnerability in the Internet Connection Signup Wizard in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a Trojan horse smmscrpt.dll file in the current working directory, as demonstrated by a directory that contains an ISP or INS file, aka "Internet Connection Signup Wizard Insecure Library Loading Vulnerability." | ||||||||||||||||||||
family | windows | ||||||||||||||||||||
id | oval:org.mitre.oval:def:11993 | ||||||||||||||||||||
status | accepted | ||||||||||||||||||||
submitted | 2010-06-08T13:00:00 | ||||||||||||||||||||
title | Internet Connection Signup Wizard Insecure Library Loading Vulnerability | ||||||||||||||||||||
version | 72 |
References
- http://www.exploit-db.com/exploits/14754/
- http://www.exploit-db.com/exploits/14754/
- http://www.securitytracker.com/id?1024879
- http://www.securitytracker.com/id?1024879
- http://www.us-cert.gov/cas/techalerts/TA10-348A.html
- http://www.us-cert.gov/cas/techalerts/TA10-348A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-097
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-097
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11993
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11993