7.2
CVSSv2

CVE-2010-4398

Published: 06/12/2010 Updated: 12/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the RtlQueryRegistryValues function in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges, and bypass the User Account Control (UAC) feature, via a crafted REG_BINARY value for a SystemDefaultEUDCFont registry key, aka "Driver Improper Interaction with Windows Kernel Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows xp

microsoft windows 2003 server

microsoft windows server 2008 r2

microsoft windows server 2008

microsoft windows vista

microsoft windows 7

Exploits

A Design Flaw in Windows Kernel API can Lead to privilege escalation Mirror of Original Post: wwwexploit-dbcom/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/ PoC: wwwcodeprojectcom/KB/vista-security/uacaspx (not available) mirror: githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploit ...

Recent Articles

Carders cash out hundreds of millions before USA adopts EMV
The Register • Darren Pauli • 22 Apr 2016

Stolen card values on the way down ahead of chip card debut

A hacker group has stolen some 10 million credit cards, putting itself in a position to score US$400 million (£279 million, A$516 million) by infecting 2000 payment terminals with the Trinity point of sales malware. Security firm FireEye and subsidiaries iSIGHT Partners and Mandiant examined the "Fin6" group last year after it was found plundering millions of cards. The first two firms now say the cards stolen from hospitality and retails firms have earned the hacking group hundreds of millions...