Описание
Untrusted search path vulnerability in Microsoft Windows Server 2008 R2 and Windows 7, when BranchCache is supported, allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains an EML file, an RSS file, or a WPOST file, aka "BranchCache Insecure Library Loading Vulnerability."
Untrusted search path vulnerability in Microsoft Windows Server 2008 R2 and Windows 7, when BranchCache is supported, allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains an EML file, an RSS file, or a WPOST file, aka "BranchCache Insecure Library Loading Vulnerability."
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2010-3966
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-095
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12163
- http://osvdb.org/69816
- http://secunia.com/advisories/42609
- http://www.securityfocus.com/bid/45295
- http://www.securitytracker.com/id?1024877
- http://www.us-cert.gov/cas/techalerts/TA10-348A.html
- http://www.vupen.com/english/advisories/2010/3218
EPSS
CVE ID
Связанные уязвимости
Untrusted search path vulnerability in Microsoft Windows Server 2008 R2 and Windows 7, when BranchCache is supported, allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains an EML file, an RSS file, or a WPOST file, aka "BranchCache Insecure Library Loading Vulnerability."
EPSS