Welcome to the Virus Encyclopedia of Panda Security.
MS10-059 is not categorized as virus, worm, Trojan or backdoor. It is a group of important vulnerabilities in the Tracing Feature for Services on Windows 2008/7/Vista computers, which allows to gain local privilege escalation.
The addressed vulnerabilities are:
- Tracing Registry Key ACL vulnerability: it occurs when Windows places incorrect access control lists (ACLs) on registry keys for the Tracing Feature for Services.
- Tracing memory Corruption vulnerability: this vulnerability occurs due to the way that the Tracing Feature for Services allocates memory when processing specially crafted long strings from the registry.
If exploited successfully, MS10-059 would allow to gain unauthorized privileges on a computer or network. An example of privilege elevation would be an unprivileged user who could manage to be added to the Administrator's group. In such case, the hacker could take complete control of the system: create, modify or delete files, install programs, create new user accounts, etc.
They are usually exploited by running a specially crafted program in the vulnerable computer. In order to do so, a hacker must be able to log on locally to the system.
If you have a Windows 2008/7/Vista computer, it is recommended to download and apply the security patch for this vulnerability. Click here to access the web page for downloading the patch.