First published: Wed Aug 11 2010(Updated: )
Integer overflow in the TCP/IP stack in Microsoft Windows Vista SP1, Windows Server 2008 Gold and R2, and Windows 7 allows local users to gain privileges via a buffer of user-mode data that is copied to kernel mode, aka "Integer Overflow in Windows Networking Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 7 | ||
Microsoft Windows 7 | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2010-1893 is rated as critical, as it allows local users to gain elevated privileges.
To fix CVE-2010-1893, you should apply the security updates provided by Microsoft for the affected versions of Windows.
CVE-2010-1893 affects Microsoft Windows Vista SP1, Windows Server 2008, and Windows 7.
CVE-2010-1893 is an integer overflow vulnerability in the TCP/IP stack.
Local users can exploit CVE-2010-1893 to gain privileges on affected systems.