Vulnerability Name: CVE-2010-0232 (CCN-55742) Assigned: 2010-01-19 Published: 2010-01-19 Updated: 2019-02-26 Summary: The kernel in Microsoft Windows NT 3.1 through Windows 7, including Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, and Windows Server 2008 Gold and SP2, when access to 16-bit applications is enabled on a 32-bit x86 platform, does not properly validate certain BIOS calls, which allows local users to gain privileges by crafting a VDM_TIB data structure in the Thread Environment Block (TEB), and then calling the NtVdmControl function to start the Windows Virtual DOS Machine (aka NTVDM) subsystem, leading to improperly handled exceptions involving the #GP trap handler (nt!KiTrap0D), aka "Windows Kernel Exception Handler Vulnerability." CVSS v3 Severity: 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )5.9 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C )5.9 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-264 Vulnerability Consequences: Gain Privileges References: Source: CCN Type: Full-Disclosure Mailing List, Tue Jan 19 2010Microsoft Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack Source: CONFIRM Type: UNKNOWNhttp://blogs.technet.com/msrc/archive/2010/01/20/security-advisory-979682-released.aspx Source: MITRE Type: CNACVE-2010-0232 Source: MLIST Type: UNKNOWN[dailydave] 20100119 We hold these axioms to be self evident Source: MISC Type: Exploithttp://lock.cmpxchg8b.com/c0af0967d904cef2ad4db766a00bc6af/KiTrap0D.zip Source: FULLDISC Type: UNKNOWN20100119 Microsoft Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack Source: CCN Type: SA38265Microsoft Windows "KiTrap0D" Privilege Escalation Vulnerability Source: SECUNIA Type: Vendor Advisory38265 Source: CCN Type: SECTRACK ID: 1023471Windows Kernel #GP Trap Handler Flaw Lets Local Users Gain Elevated Privileges Source: SECTRACK Type: UNKNOWN1023471 Source: CCN Type: Microsoft Security Bulletin MS11-098Vulnerability in Windows Kernel Could Allow Elevation of Privilege (2633171) Source: CCN Type: Microsoft Security Bulletin MS12-042Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2711167) Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.microsoft.com/technet/security/advisory/979682.mspx Source: CCN Type: Microsoft Security Bulletin MS10-015Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (977165) Source: CCN Type: Microsoft Security Bulletin MS10-021Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (979683) Source: CCN Type: Microsoft Security Bulletin MS10-047Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (981852) Source: CCN Type: Microsoft Security Bulletin MS11-011Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2393802) Source: CCN Type: Microsoft Web siteMicrosoft Windows Source: BUGTRAQ Type: UNKNOWN20100119 Microsoft Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack Source: BID Type: Exploit37864 Source: CCN Type: BID-37864Microsoft Windows #GP Trap Handler Local Privilege Escalation Vulnerability Source: CERT Type: US Government ResourceTA10-040A Source: VUPEN Type: Vendor AdvisoryADV-2010-0179 Source: MS Type: UNKNOWNMS10-015 Source: XF Type: UNKNOWNms-win-gptrap-privilege-escalation(55742) Source: XF Type: UNKNOWNms-win-gptrap-privilege-escalation(55742) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:8344 Source: CCN Type: Packet Storm Security [11-14-2013]Windows SYSTEM Escalation Via KiTrap0D Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCYKNOWN EXPLOITED VULNERABILITIES CATALOG Vulnerable Configuration: Configuration 1 :cpe:/o:microsoft:windows_2000:sp4:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_7:-:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:3.1:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:itanium:* OR cpe:/o:microsoft:windows_server_2008:*:*:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:* OR cpe:/o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:* OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:* OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:*:*:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:sp1:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:sp2:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:-:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* OR cpe:/o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:microsoft:windows_nt:4.0:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_2000:-:sp4:*:*:*:*:*:* OR cpe:/o:microsoft:windows:xp:sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows:server_2003:*:sp2:*:*:*:*:* OR cpe:/o:microsoft:windows_nt:3.1:*:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista:-:sp1:*:*:*:*:*:* OR cpe:/o:microsoft:windows:xp:sp3:*:*:*:*:*:* OR cpe:/o:microsoft:windows_vista::sp2:*:*:*:*:*:* OR cpe:/o:microsoft:windows_7:::x32:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
microsoft windows 2000 sp4
microsoft windows 7 -
microsoft windows nt 3.1
microsoft windows server 2003 * sp2
microsoft windows server 2008 *
microsoft windows server 2008 *
microsoft windows server 2008 *
microsoft windows server 2008 * sp2
microsoft windows server 2008 - sp2
microsoft windows server 2008 sp2 x32
microsoft windows vista *
microsoft windows vista *
microsoft windows vista * sp1
microsoft windows vista * sp2
microsoft windows vista sp1
microsoft windows vista sp2
microsoft windows xp -
microsoft windows xp - sp2
microsoft windows xp sp3
microsoft windows nt 4.0
microsoft windows 2000 sp4
microsoft windows xp sp2
microsoft windows vista
microsoft windows server_2003
microsoft windows nt 3.1
microsoft windows vista sp1
microsoft windows xp sp3
microsoft windows vista sp2
microsoft windows 7