The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold does not perform the expected validation before creating a symbolic link, which allows local users to cause a denial of service (reboot) via a crafted application, aka "Windows Kernel Symbolic Link Value Vulnerability."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-021 | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7509 | vdb entry signature |
http://www.us-cert.gov/cas/techalerts/TA10-103A.html | third party advisory us government resource |
http://secunia.com/advisories/39373 | third party advisory |
http://www.securitytracker.com/id?1023850 | vdb entry |