Vulnerability Description
Stack-based buffer overflow in the Remote Procedure Call Subsystem (RPCSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted LPC message that requests an LRPC connection from an LPC server to a client, aka "LPC Message Buffer Overrun Vulnerability."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows Server 2003 | All versions |
| Microsoft | Windows Xp | All versions |
Related Weaknesses (CWE)
References
- http://www.securitytracker.com/id?1024553
- http://www.us-cert.gov/cas/techalerts/TA10-285A.htmlUS Government Resource
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-08
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://www.securitytracker.com/id?1024553
- http://www.us-cert.gov/cas/techalerts/TA10-285A.htmlUS Government Resource
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-08
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2010-3222?
CVE-2010-3222 is a vulnerability with a CVSS score of 7.2 (HIGH). Stack-based buffer overflow in the Remote Procedure Call Subsystem (RPCSS) in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted LPC message that ...
How severe is CVE-2010-3222?
CVE-2010-3222 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-3222?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows Server 2003, Microsoft Windows Xp.