CVE-2010-0480 – Microsoft MPEG Layer-3 Audio Decoder - Division By Zero
https://notcve.org/view.php?id=CVE-2010-0480
Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to execute arbitrary code via a crafted AVI file, aka "MPEG Layer-3 Audio Decoder Stack Overflow Vulnerability." Desbordamiento de búfer basado en pila en los codificadores de audio MPEG Layer-3 en Microsoft Windows 2000 SP4, XP SP2 y SP3, Server 2003 SP2, Vista Gold, SP1, SP2, y Server 2008 Gold y SP2 permite a atacantes remotos ejecutar código de su elección a través de un fichero AVI manipulado, conocido como "vulnerabilidad de desbordamiento de pila en el decodificador de audio MPEG Layer-3" • https://www.exploit-db.com/exploits/15096 https://www.exploit-db.com/exploits/14895 https://www.exploit-db.com/exploits/17659 http://securityreason.com/securityalert/8336 http://www.us-cert.gov/cas/techalerts/TA10-103A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-026 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7441 https://www.exploit-db.com/moaub-5-microsoft-mpeg-layer-3-audio-stack-based-overflow http: • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2010-0024
https://notcve.org/view.php?id=CVE-2010-0024
The SMTP component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Server 2008 Gold, SP2, and R2, and Exchange Server 2003 SP2, does not properly parse MX records, which allows remote DNS servers to cause a denial of service (service outage) via a crafted response to a DNS MX record query, aka "SMTP Server MX Record Vulnerability." El componente SMTP en Microsoft Windows 2000 SP4, XP SP2 y SP3, Server 2003 SP2, y Server 2008 Gold, SP2, y R2, y Exchange Server 2000 SP3, no valida adecuadamente los registros MX, lo que permite a servidores DNS remotos causar una denegación de servicio (apagado de servicio)a través de respuestas manipuladas en una petición de registro MX, también conocido como "Vulnerabilidad de registro MX en servidor SMTP" • http://www.us-cert.gov/cas/techalerts/TA10-103A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-024 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7067 • CWE-20: Improper Input Validation •
CVE-2010-0236
https://notcve.org/view.php?id=CVE-2010-0236
The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold does not properly allocate memory for the destination key associated with a symbolic-link registry key, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Allocation Vulnerability." El kernel en Microsoft Windows 2000 SP4, XP SP2 y SP3, Server 2003 SP2, y Vista Gold no asigna adecuadamente memoria para llave destino asociada con una llave de registro de enlace simbólico, lo que permite a usuarios locales obtener privilegios a través de una aplicación manipulada, conocido como "Windows Kernel Memory Allocation Vulnerability." • http://secunia.com/advisories/39373 http://www.securitytracker.com/id?1023850 http://www.us-cert.gov/cas/techalerts/TA10-103A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7113 • CWE-399: Resource Management Errors •
CVE-2010-0486
https://notcve.org/view.php?id=CVE-2010-0486
The WinVerifyTrust function in Authenticode Signature Verification 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly use unspecified fields in a file digest, which allows user-assisted remote attackers to execute arbitrary code via a modified (1) Portable Executable (PE) or (2) cabinet (aka .CAB) file that incorrectly appears to have a valid signature, aka "WinVerifyTrust Signature Validation Vulnerability." La función WinVerifyTrust en Authenticode Signature Verification v5.1, v6.0, y v6.1 en Microsoft Windows 2000 SP4, Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, y SP2, Windows Server 2008 Gold, SP2, y R2, y Windows 7 no usa adecuadamente campos no especificados en el fichero digest, lo que permite a atacantes remotos asistidos por usuario ejecutar código de su elección a través de (1) Portable Executable (PE)modificado o (2) un fichero cabinet (como .CAB) que que aparece incorrectamente teniendo una firma válida, conocido como "WinVerifyTrust Signature Validation Vulnerability." • http://www.us-cert.gov/cas/techalerts/TA10-103A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-019 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6787 • CWE-20: Improper Input Validation •
CVE-2010-0487
https://notcve.org/view.php?id=CVE-2010-0487
The Authenticode Signature verification functionality in cabview.dll in Cabinet File Viewer Shell Extension 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly use unspecified fields in a file digest, which allows remote attackers to execute arbitrary code via a modified cabinet (aka .CAB) file that incorrectly appears to have a valid signature, aka "Cabview Corruption Validation Vulnerability." La funcionalidad de verificación Authenticode Signature en cabview.dll en Cabinet File Viewer Shell Extension v5.1, v6.0, y v6.1 en Microsoft Windows 2000 SP4, Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, y SP2, Windows Server 2008 Gold, SP2, y R2, y Windows 7 no usa adecuadamente los campos en un fichero digest, lo que permite a atacantes remotos ejecutar código de su elección a través de un cabinet modificado (como .CAB) que aparenta incorrectamente tener una firma valida, conocida como "Cabview Corruption Validation Vulnerability." • http://www.us-cert.gov/cas/techalerts/TA10-103A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-019 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6886 • CWE-20: Improper Input Validation •