Summary
This host is prone to multiple unspecified vulnerabilities.
Impact
Successful exploitation could allow local attackers to gain privileges or compromise the vulnerable system via unknown vectors.
Impact Level: Application
Solution
Remove all Stuxnet related files found.
Insight
Unspecified privilege elevation vulnerabilities that are used by variants of the 'Stuxnet malware' family. Each of these vulnerabilities allow the malware to elevate its privileges to higher than normal user levels in order to embed itself into the operating system and prevent disinfection and/or detection.
Affected
All Windows platforms
References
- http://www.computerworld.com/s/article/9185919/Is_Stuxnet_the_best_malware_ever_
- http://www.securelist.com/en/blog/2291/Myrtus_and_Guava_Episode_MS10_061
- http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities
- http://www.virusbtn.com/conference/vb2010/abstracts/LastMinute7.xml
- http://www.virusbtn.com/conference/vb2010/abstracts/LastMinute8.xml
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2010-3888, CVE-2010-3889 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- SecureCRT SSH1 protocol version string overflow
- Microsoft HTML Help Workshop buffer overflow vulnerability
- Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
- Microsoft Windows Progman Group Converter Insecure Library Loading Vulnerability
- Microsoft Remote Desktop Protocol Security Advisory (2861855)