CVE-2010-0252

The Microsoft Data Analyzer ActiveX control (aka the Office Excel ActiveX control for Data Analysis) in max3activex.dll in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote attackers to execute arbitrary code via a crafted web page that corrupts the "system state," aka "Microsoft Data Analyzer ActiveX Control Vulnerability."
Configurations

Configuration 1 (hide)

cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:x64:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*

History

21 Nov 2024, 01:11

Type Values Removed Values Added
References () http://secunia.com/advisories/38503 - Vendor Advisory () http://secunia.com/advisories/38503 - Vendor Advisory
References () http://secunia.com/advisories/40059 - () http://secunia.com/advisories/40059 -
References () http://www.us-cert.gov/cas/techalerts/TA10-040A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA10-040A.html - US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA10-159B.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA10-159B.html - US Government Resource
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-008 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-008 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-034 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-034 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8424 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8424 -

07 Dec 2023, 18:38

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:*

Information

Published : 2010-02-10 18:30

Updated : 2024-11-21 01:11


NVD link : CVE-2010-0252

Mitre link : CVE-2010-0252

CVE.ORG link : CVE-2010-0252


JSON object : View

Products Affected

microsoft

  • windows_server_2008
  • windows_vista
  • windows_2003_server
  • windows_xp
  • windows_7
  • windows_2000
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')