| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.0 | $0-$5k | 0.00 |
Summary
A vulnerability marked as problematic has been reported in Microsoft Windows. This issue affects the function PostMessage. The manipulation leads to input validation.
This vulnerability is uniquely identified as CVE-2010-1735. Local access is required to approach this attack. Moreover, an exploit is present.
Details
A vulnerability, which was classified as problematic, has been found in Microsoft Windows (Operating System) (the affected version is unknown). This issue affects the function PostMessage. The manipulation with an unknown input leads to a input validation vulnerability. Using CWE to declare the problem leads to CWE-20. The product receives input or data, but it does
not validate or incorrectly validates that the input has the
properties that are required to process the data safely and
correctly. Impacted is availability. The summary by CVE is:
The SfnLOGONNOTIFY function in win32k.sys in the kernel in Microsoft Windows 2000, XP, and Server 2003 allows local users to cause a denial of service (system crash) via a 0x4c value in the second argument (aka the Msg argument) of a PostMessage function call for the DDEMLEvent window.
The weakness was disclosed 05/06/2010 by MJ0011 (Website). The advisory is shared at securityfocus.com. The identification of this vulnerability is CVE-2010-1735. The exploitation is known to be easy. An attack has to be approached locally. A simple authentication is needed for exploitation. Technical details as well as a public exploit are known.
A public exploit has been developed in ANSI C. The exploit is available at securityfocus.com. It is declared as proof-of-concept. We expect the 0-day to have been worth approximately $5k-$25k.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at SecurityFocus (BID 39630†), Secunia (SA39456†) and Vulnerability Center (SBV-26583†). The entries VDB-54314 and VDB-54310 are pretty similar. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.microsoft.com/
- Product: https://www.microsoft.com/en-us/windows
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.5VulDB Meta Temp Score: 5.0
VulDB Base Score: 5.5
VulDB Temp Score: 5.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Input validationCWE: CWE-20
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Programming Language: 🔍
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
OpenVAS ID: 801333
OpenVAS Name: Microsoft Windows Kernel win32k.sys Multiple DOS Vulnerabilities
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
04/22/2010 🔍05/05/2010 🔍
05/06/2010 🔍
05/06/2010 🔍
05/06/2010 🔍
07/29/2010 🔍
03/19/2015 🔍
03/31/2025 🔍
Sources
Vendor: microsoft.comProduct: microsoft.com
Advisory: securityfocus.com⛔
Researcher: MJ0011
Status: Not defined
CVE: CVE-2010-1735 (🔍)
GCVE (CVE): GCVE-0-2010-1735
GCVE (VulDB): GCVE-100-53057
SecurityFocus: 39630 - Microsoft Windows 'SfnLOGONNOTIFY' Local Privilege Escalation Vulnerability
Secunia: 39456
Vulnerability Center: 26583 - Microsoft Windows 2000, XP and Server 2003 SfnLOGONNOTIFY Function Local DoS Vulnerability, Medium
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 03/19/2015 12:22Updated: 03/31/2025 06:28
Changes: 03/19/2015 12:22 (52), 04/07/2017 16:04 (13), 09/08/2021 23:29 (3), 03/31/2025 06:28 (19)
Complete: 🔍
Cache ID: 216:C82:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.