Summary
This host is prone to multiple unspecified vulnerabilities.
Impact
Successful exploitation could allow local attackers to gain privileges or compromise the vulnerable system via unknown vectors.
Impact Level: Application
Solution
Remove all Stuxnet related files found.
Insight
Unspecified privilege elevation vulnerabilities that are used by variants of the 'Stuxnet malware' family. Each of these vulnerabilities allow the malware to elevate its privileges to higher than normal user levels in order to embed itself into the operating system and prevent disinfection and/or detection.
Affected
All Windows platforms
References
- http://www.computerworld.com/s/article/9185919/Is_Stuxnet_the_best_malware_ever_
- http://www.securelist.com/en/blog/2291/Myrtus_and_Guava_Episode_MS10_061
- http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities
- http://www.virusbtn.com/conference/vb2010/abstracts/LastMinute7.xml
- http://www.virusbtn.com/conference/vb2010/abstracts/LastMinute8.xml
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2010-3888, CVE-2010-3889 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Cisco VPN Client Privilege Escalation Vulnerability
- Microsoft WMI Administrative Tools ActiveX Control Remote Code Execution Vulnerabilities
- Microsoft Office Products Insecure Library Loading Vulnerability
- Computer Associates WebScan ActiveX Control Multiple Remote Code Execution Vulnerabilities
- Sophos Anti Virus Check