RULE(RULE ID:310838)

Rule General Information
Release Date: 2021-03-15
Rule Name: Microsoft WMI Administrative Tools Code Injection Vulnerability (CVE-2010-3973)
Severity:
CVE ID:
Rule Protection Details
Description: Multiple vulnerabilities have been reported in Microsoft Windows Management Instrumentation (WMI) Administrative Tools that could be exploited by remote attackers to compromise a vulnerable user's system. The vulnerabilities are due to the way "AddContextRef()" and "ReleaseContext()" methods of the WMI Object Viewer control improperly handle the "lCtxHandle" parameter. Remote, unauthenticated attackers could exploit this vulnerability by enticing an unsuspecting user to process a malicious web page. This can lead to code execution on their system under the context of the affected application.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Windows
Reference: ExploitDB:15809
SecurityFocusBID:45546
MicrosoftSecurityBulletin:ms11-027
http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://technet.microsoft.com/en-us/security/bulletin/ms11-027