First published: Wed Apr 14 2010(Updated: )
The kernel in Microsoft Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, does not properly handle unspecified exceptions, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Exception Handler Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | ||
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | ||
Microsoft Windows Vista | =sp2 | |
=sp2 | ||
=sp2 | ||
=sp2 | ||
=sp2 | ||
=sp1 | ||
=sp2 | ||
=sp1 | ||
=sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0810 has a severity rating that indicates it can lead to a denial of service on affected systems.
To fix CVE-2010-0810, it is advised to apply the latest security updates provided by Microsoft.
CVE-2010-0810 affects Microsoft Windows Vista and Windows Server 2008 in various Service Pack versions.
CVE-2010-0810 can be exploited by local users to cause a system reboot through a crafted application.
There are no known workarounds for CVE-2010-0810; the best protection is to install the patch from Microsoft.