Welcome to the Virus Encyclopedia of Panda Security.
MS10-058 is not categorized as virus, worm, Trojan or backdoor. It is a group of important vulnerabilities in TCP/IP on Windows 2008/7/Vista computers, which allows to gain local privilege escalation and to launch denial of service attacks.
TCP/IP is the suite of communication protocols used for sending data over networks.
The addressed vulnerabilities are:
- IPv6 Memory Corruption vulnerability: a denial of service vulnerability that occurs due to an error in the processing of specially crafted IPv6 packets with a malformed extension header.
If exploited successfully, MS10-058 could cause the system to stop responding until it is restarted.
- Integer Overflow in Windows Networking vulnerability: an elevation of privilege vulnerability that occurs when the Windows TCP/IP stack does not properly handle data copied from user mode.
If exploited successfully, MS10-058 allows to gain unauthorized privileges on a computer or network. An example of privilege elevation would be an unprivileged user who could manage to be added to the Administrator's group. In such case, the hacker could take complete control of the system: create, modify or delete files, install programs, create new user accounts, etc.
MS10-058 is usually exploited by running a specially crafted program in the vulnerable computer. In order to do so, a hacker must be able to log on locally to the system.
If you have a Windows 2008/7/Vista computer, it is recommended to download and apply the security patch for this vulnerability. Click here to access the web page for downloading the patch.
Bear in mind that this security patch replaces a previous one, called MS10-029.