Vulnerability Name: | CVE-2010-4701 (CCN-64307) | ||||||||
Assigned: | 2010-12-25 | ||||||||
Published: | 2010-12-25 | ||||||||
Updated: | 2017-09-19 | ||||||||
Summary: | Heap-based buffer overflow in the CDrawPoly::Serialize function in fxscover.exe in Microsoft Windows Fax Services Cover Page Editor 5.2 r2 in Windows XP Professional SP3, Server 2003 R2 Enterprise Edition SP2, and Windows 7 Professional allows remote attackers to execute arbitrary code via a long record in a Fax Cover Page (.cov) file. Note: some of these details are obtained from third party information. | ||||||||
CVSS v3 Severity: | 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.6 High (CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C) 6.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:U/RC:UR)
6.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2010-4701 Source: CCN Type: retrogod Microsoft Windows Fax Services Cover Page Editor (.cov) Memory Corruption poc Source: MISC Type: Exploit http://retrogod.altervista.org/9sg_cov_bof.html Source: CCN Type: SA42747 Microsoft Windows Fax Cover Page Editor Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory 42747 Source: CCN Type: SECTRACK ID: 1024925 Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code Source: EXPLOIT-DB Type: Exploit 15839 Source: CCN Type: Microsoft Web site Microsoft Windows Source: CCN Type: OSVDB ID: 70126 Microsoft Windows Fax Cover Page Editor CDrawPoly::Serialize() Function Overflow Source: CCN Type: BID-45583 Microsoft Windows Fax Cover Page Editor Remote Code Execution Vulnerability Source: SECTRACK Type: UNKNOWN 1024925 Source: CERT Type: US Government Resource TA11-102A Source: XF Type: UNKNOWN ms-windows-cover-page-bo(64307) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:12689 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [12-28-2010] | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |