CVE-2010-2567
CVSS V2 High 9.3
CVSS V3 None
Description
The RPC client implementation in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly allocate memory during the parsing of responses, which allows remote RPC servers and man-in-the-middle attackers to execute arbitrary code via a malformed response, aka "RPC Memory Corruption Vulnerability."
Overview
- CVE ID
- CVE-2010-2567
- Assigner
- secure@microsoft.com
- Vulnerability Status
- Modified
- Published Version
- 2010-09-15T19:00:18
- Last Modified Date
- 2019-02-26T14:04:00
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 9.3
- Severity
- HIGH
- Exploitability Score
- 8.6
- Impact Score
- 10
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2010-2567 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2567 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 07:58:03 | Added to TrackCVE |