CVE-2010-0492

Use-after-free vulnerability in mstime.dll in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via vectors related to the TIME2 behavior, the CTimeAction object, and destruction of markup, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:8.0.6001:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*

History

21 Nov 2024, 01:12

Type Values Removed Values Added
References () http://securitytracker.com/id?1023773 - () http://securitytracker.com/id?1023773 -
References () http://www.securityfocus.com/archive/1/510506/100/0/threaded - () http://www.securityfocus.com/archive/1/510506/100/0/threaded -
References () http://www.securityfocus.com/bid/39030 - Patch () http://www.securityfocus.com/bid/39030 - Patch
References () http://www.us-cert.gov/cas/techalerts/TA10-068A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA10-068A.html - US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA10-089A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA10-089A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2010/0744 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2010/0744 - Patch, Vendor Advisory
References () http://www.zerodayinitiative.com/advisories/ZDI-10-033 - () http://www.zerodayinitiative.com/advisories/ZDI-10-033 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7722 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7722 -

21 Oct 2024, 17:35

Type Values Removed Values Added
CVSS v2 : 9.3
v3 : unknown
v2 : 9.3
v3 : 8.1

07 Dec 2023, 18:38

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:*

Information

Published : 2010-03-31 19:30

Updated : 2024-11-21 01:12


NVD link : CVE-2010-0492

Mitre link : CVE-2010-0492

CVE.ORG link : CVE-2010-0492


JSON object : View

Products Affected

microsoft

  • windows_vista
  • windows_7
  • windows_xp
  • windows_2003_server
  • windows_server_2003
  • windows_server_2008
  • internet_explorer
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')