Vulnerability Name:

CVE-2010-4701 (CCN-64307)

Assigned:2010-12-25
Published:2010-12-25
Updated:2017-09-19
Summary:Heap-based buffer overflow in the CDrawPoly::Serialize function in fxscover.exe in Microsoft Windows Fax Services Cover Page Editor 5.2 r2 in Windows XP Professional SP3, Server 2003 R2 Enterprise Edition SP2, and Windows 7 Professional allows remote attackers to execute arbitrary code via a long record in a Fax Cover Page (.cov) file.
Note: some of these details are obtained from third party information.
CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.6 High (CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
6.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:POC/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-4701

Source: CCN
Type: retrogod
Microsoft Windows Fax Services Cover Page Editor (.cov) Memory Corruption poc

Source: MISC
Type: Exploit
http://retrogod.altervista.org/9sg_cov_bof.html

Source: CCN
Type: SA42747
Microsoft Windows Fax Cover Page Editor Buffer Overflow Vulnerability

Source: SECUNIA
Type: Vendor Advisory
42747

Source: CCN
Type: SECTRACK ID: 1024925
Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code

Source: EXPLOIT-DB
Type: Exploit
15839

Source: CCN
Type: Microsoft Web site
Microsoft Windows

Source: CCN
Type: OSVDB ID: 70126
Microsoft Windows Fax Cover Page Editor CDrawPoly::Serialize() Function Overflow

Source: CCN
Type: BID-45583
Microsoft Windows Fax Cover Page Editor Remote Code Execution Vulnerability

Source: SECTRACK
Type: UNKNOWN
1024925

Source: CERT
Type: US Government Resource
TA11-102A

Source: XF
Type: UNKNOWN
ms-windows-cover-page-bo(64307)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:12689

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [12-28-2010]

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2003_server:*:r2_sp2:enterprise:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:*:*:professional:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_xp:*:*:*:*:home:*:*:*
  • OR cpe:/o:microsoft:windows_xp:*:*:professional:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:12689
    V
    Fax Cover Page Use After Free Vulnerability
    2012-03-26
    BACK
    microsoft windows 2003 server * r2_sp2
    microsoft windows 7 *
    microsoft windows xp * sp3
    microsoft windows xp *
    microsoft windows xp *
    microsoft windows vista *
    microsoft windows 7 *