| Title | Windows Address Book の wab.exe における権限昇格の脆弱性 |
|---|---|
| Summary | Windows Address Book の wab.exe には、権限を取得される脆弱性が存在します。 |
| Possible impacts | ローカルユーザにより、カレントワーキングディレクトリ内にあるトロイの木馬の wab32res.dll ファイルを介して、権限を取得される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Dec. 14, 2010, midnight |
| Registration Date | Jan. 14, 2011, 3:47 p.m. |
| Last Update | Jan. 14, 2011, 3:47 p.m. |
| CVSS2.0 : 危険 | |
| Score | 9.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:C/I:C/A:C |
| マイクロソフト |
| Microsoft Windows 7 (x32) |
| Microsoft Windows 7 (x64) |
| Microsoft Windows Server 2003 |
| Microsoft Windows Server 2003 (itanium) |
| Microsoft Windows Server 2003 (x64) |
| Microsoft Windows Server 2008 (itanium) |
| Microsoft Windows Server 2008 (x64) |
| Microsoft Windows Server 2008 (x86) |
| Microsoft Windows Server 2008 r2(itanium) |
| Microsoft Windows Server 2008 r2(x64) |
| Microsoft Windows Vista |
| Microsoft Windows Vista (x64) |
| Microsoft Windows XP (x64) |
| Microsoft Windows XP sp3 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2011年01月14日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | Untrusted search path vulnerability in wab.exe 6.00.2900.5512 in Windows Address Book in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows local users to gain privileges via a Trojan horse wab32res.dll file in the current working directory, as demonstrated by a directory that contains a Windows Address Book (WAB), VCF (aka vCard), or P7C file, aka "Insecure Library Loading Vulnerability." NOTE: the codebase for this product may overlap the codebase for the product referenced in CVE-2010-3143. |
|---|---|
| Publication Date | Aug. 28, 2010, 4 a.m. |
| Registration Date | Jan. 29, 2021, 11:05 a.m. |
| Last Update | Nov. 21, 2024, 10:18 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:microsoft:outlook_express:6.00.2900.5512:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* | |||||
| cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* | |||||