7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
0.4%
The Routing and Remote Access NDProxy component of the remote Windows host does not properly validate user-supplied input when passing data from user mode to the kernel.
An attacker who can log on locally to the affected system can exploit this to run arbitrary code in kernel mode.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(51171);
script_version("1.22");
script_cvs_date("Date: 2018/11/15 20:50:30");
script_cve_id("CVE-2010-3963");
script_bugtraq_id(45269);
script_xref(name:"MSFT", value:"MS10-099");
script_xref(name:"MSKB", value:"2440591");
script_name(english:"MS10-099: Vulnerability in Routing and Remote Access Could Allow Elevation of Privilege (2440591)");
script_summary(english:"Checks the version of Ndproxy.sys");
script_set_attribute(
attribute:"synopsis",
value:
"The Windows kernel is affected by a vulnerability that could allow
escalation of privileges."
);
script_set_attribute(
attribute:"description",
value:
"The Routing and Remote Access NDProxy component of the remote Windows
host does not properly validate user-supplied input when passing data
from user mode to the kernel.
An attacker who can log on locally to the affected system can exploit
this to run arbitrary code in kernel mode."
);
script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2010/ms10-099");
script_set_attribute(attribute:"solution", value:"Microsoft has released a set of patches for Windows XP and 2003.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2010/12/14");
script_set_attribute(attribute:"patch_publication_date", value:"2010/12/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/12/15");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows : Microsoft Bulletins");
script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");
script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
script_require_keys("SMB/MS_Bulletin_Checks/Possible");
script_require_ports(139, 445, 'Host/patch_management_checks');
exit(0);
}
include("audit.inc");
include("smb_hotfixes_fcheck.inc");
include("smb_hotfixes.inc");
include("smb_func.inc");
include("misc_func.inc");
get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
bulletin = 'MS10-099';
kbs = make_list("2440591");
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);
get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);
if (hotfix_check_sp_range(xp:'3', win2003:'2') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
rootfile = hotfix_get_systemroot();
if (!rootfile) exit(1, "Failed to get the system root.");
share = hotfix_path2share(path:rootfile);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);
kb = "2440591";
if (
# Windows 2003 and XP x64
hotfix_is_vulnerable(os:"5.2", sp:2, file:"Ndproxy.sys", version:"5.2.3790.4795", dir:"\System32\drivers", bulletin:bulletin, kb:kb) ||
# Windows XP
hotfix_is_vulnerable(os:"5.1", sp:3, arch:"x86", file:"Ndproxy.sys", version:"5.1.2600.6048", dir:"\System32\drivers", bulletin:bulletin, kb:kb)
)
{
set_kb_item(name:"SMB/Missing/MS10-099", value:TRUE);
hotfix_security_hole();
hotfix_check_fversion_end();
exit(0);
}
else
{
hotfix_check_fversion_end();
audit(AUDIT_HOST_NOT, 'affected');
}