Vulnerabilities > CVE-2010-3966 - Unspecified vulnerability in Microsoft Windows 7 and Windows Server 2008
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Untrusted search path vulnerability in Microsoft Windows Server 2008 R2 and Windows 7, when BranchCache is supported, allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains an EML file, an RSS file, or a WPOST file, aka "BranchCache Insecure Library Loading Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 3 |
Msbulletin
bulletin_id | MS10-095 |
bulletin_url | |
date | 2010-12-14T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2385678 |
knowledgebase_url | |
severity | Important |
title | Vulnerability in Microsoft Windows Could Allow Remote Code Execution |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS10-095.NASL |
description | The remote Windows host contains a version of Windows BranchCache that incorrectly restricts the path used for loading external libraries. If an attacker can trick a user on the affected system into opening a specially crafted file (eg, .eml and .rss (Windows Live Mail) or .wpost (Microsoft Live Writer)) that is located in the same network directory as a specially crafted dynamic link library (DLL) file, he may be able to leverage this issue to execute arbitrary code subject to the user |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 51167 |
published | 2010-12-15 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/51167 |
title | MS10-095: Vulnerability in Microsoft Windows Could Allow Remote Code Execution (2385678) |
code |
|
Oval
accepted | 2012-03-26T04:00:56.276-04:00 | ||||||||||||||||
class | vulnerability | ||||||||||||||||
contributors |
| ||||||||||||||||
definition_extensions |
| ||||||||||||||||
description | Untrusted search path vulnerability in Microsoft Windows Server 2008 R2 and Windows 7, when BranchCache is supported, allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains an EML file, an RSS file, or a WPOST file, aka "BranchCache Insecure Library Loading Vulnerability." | ||||||||||||||||
family | windows | ||||||||||||||||
id | oval:org.mitre.oval:def:12163 | ||||||||||||||||
status | accepted | ||||||||||||||||
submitted | 2010-06-08T13:00:00 | ||||||||||||||||
title | BranchCache Insecure Library Loading Vulnerability | ||||||||||||||||
version | 75 |
References
- http://osvdb.org/69816
- http://osvdb.org/69816
- http://secunia.com/advisories/42609
- http://secunia.com/advisories/42609
- http://www.securityfocus.com/bid/45295
- http://www.securityfocus.com/bid/45295
- http://www.securitytracker.com/id?1024877
- http://www.securitytracker.com/id?1024877
- http://www.us-cert.gov/cas/techalerts/TA10-348A.html
- http://www.us-cert.gov/cas/techalerts/TA10-348A.html
- http://www.vupen.com/english/advisories/2010/3218
- http://www.vupen.com/english/advisories/2010/3218
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-095
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-095
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12163
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12163