Microsoft Windows 7/Server 2003 SP2/Vista SP1/XP SP3 Search Path dao360.dll memory corruption
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.4 | $0-$5k | 0.00 |
Summary
A vulnerability classified as problematic was found in Microsoft Windows 7/Server 2003 SP2/Vista SP1/XP SP3. This impacts an unknown function in the library dao360.dll of the component Search Path Handler. Such manipulation leads to memory corruption. This vulnerability is listed as CVE-2010-4182. The attack must be carried out locally. There is no available exploit. Applying a patch is advised to resolve this issue.
Details
A vulnerability was found in Microsoft Windows 7/Server 2003 SP2/Vista SP1/XP SP3 (Operating System) and classified as critical. Affected by this issue is an unknown function in the library dao360.dll of the component Search Path Handler. The manipulation with an unknown input leads to a memory corruption vulnerability. Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. Impacted is confidentiality, integrity, and availability. CVE summarizes:
Untrusted search path vulnerability in the Data Access Objects (DAO) library (dao360.dll) in Microsoft Windows XP Professional SP3, Windows Server 2003 R2 Enterprise Edition SP3, Windows Vista Business SP1, and Windows 7 Professional allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse msjet49.dll that is located in the same folder as a file that is processed by dao360.dll. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
The weakness was presented 11/04/2010. This vulnerability is handled as CVE-2010-4182. The attack needs to be approached locally. The successful exploitation requires a simple authentication. There are known technical details, but no exploit is available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 09/28/2021).
Applying a patch is able to eliminate this problem.
The vulnerability is also documented in the databases at X-Force (63915), SecurityFocus (BID 44541†), OSVDB (68946†) and Vulnerability Center (SBV-28338†). VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
Version
License
Support
- end of life (old version)
Website
- Vendor: https://www.microsoft.com/
- Product: https://www.microsoft.com/en-us/windows
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.8VulDB Meta Temp Score: 8.4
VulDB Base Score: 8.8
VulDB Temp Score: 8.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Timeline
10/29/2010 🔍11/04/2010 🔍
11/04/2010 🔍
11/04/2010 🔍
11/23/2010 🔍
03/19/2015 🔍
09/28/2021 🔍
Sources
Vendor: microsoft.comProduct: microsoft.com
Status: Not defined
CVE: CVE-2010-4182 (🔍)
GCVE (CVE): GCVE-0-2010-4182
GCVE (VulDB): GCVE-100-55328
X-Force: 63915
SecurityFocus: 44541
Secunia: 41986
OSVDB: 68946
Vulnerability Center: 28338 - Data Access Objects Library (dao360.dll) in Microsoft Windows Arbitrary Code Execution Vulnerability, Critical
Entry
Created: 03/19/2015 14:37Updated: 09/28/2021 12:06
Changes: 03/19/2015 14:37 (38), 08/19/2018 20:01 (11), 09/28/2021 11:59 (2), 09/28/2021 12:06 (7)
Complete: 🔍
Cache ID: 216:E5F:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.