MEDIUM · 6.8

CVE-2010-1893

Integer overflow in the TCP/IP stack in Microsoft Windows Vista SP1, Windows Server 2008 Gold and R2, and Windows 7 allows local users to gain privileges via a buffer of user-mode data that is copied ...

Vulnerability Description

Integer overflow in the TCP/IP stack in Microsoft Windows Vista SP1, Windows Server 2008 Gold and R2, and Windows 7 allows local users to gain privileges via a buffer of user-mode data that is copied to kernel mode, aka "Integer Overflow in Windows Networking Vulnerability."

CVSS Score

6.8

MEDIUM

AV:L/AC:L/Au:S/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
MicrosoftWindows 7All versions
MicrosoftWindows Server 2008All versions
MicrosoftWindows VistaAll versions

Related Weaknesses (CWE)

References

FAQ

What is CVE-2010-1893?

CVE-2010-1893 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Integer overflow in the TCP/IP stack in Microsoft Windows Vista SP1, Windows Server 2008 Gold and R2, and Windows 7 allows local users to gain privileges via a buffer of user-mode data that is copied ...

How severe is CVE-2010-1893?

CVE-2010-1893 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2010-1893?

Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 7, Microsoft Windows Server 2008, Microsoft Windows Vista.