CVE-2010-0806

Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, aka "Uninitialized Memory Corruption Vulnerability."
References
Link Resource
http://blogs.technet.com/msrc/archive/2010/03/09/security-advisory-981374-released.aspx
http://osvdb.org/62810
http://secunia.com/advisories/38860 Vendor Advisory
http://www.kb.cert.org/vuls/id/744549 Patch US Government Resource
http://www.microsoft.com/technet/security/advisory/981374.mspx Patch Vendor Advisory
http://www.securityfocus.com/bid/38615
http://www.us-cert.gov/cas/techalerts/TA10-068A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA10-089A.html US Government Resource
http://www.vupen.com/english/advisories/2010/0567 Vendor Advisory
http://www.vupen.com/english/advisories/2010/0744 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018
https://exchange.xforce.ibmcloud.com/vulnerabilities/56772
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8446
http://blogs.technet.com/msrc/archive/2010/03/09/security-advisory-981374-released.aspx
http://osvdb.org/62810
http://secunia.com/advisories/38860 Vendor Advisory
http://www.kb.cert.org/vuls/id/744549 Patch US Government Resource
http://www.microsoft.com/technet/security/advisory/981374.mspx Patch Vendor Advisory
http://www.securityfocus.com/bid/38615
http://www.us-cert.gov/cas/techalerts/TA10-068A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA10-089A.html US Government Resource
http://www.vupen.com/english/advisories/2010/0567 Vendor Advisory
http://www.vupen.com/english/advisories/2010/0744 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018
https://exchange.xforce.ibmcloud.com/vulnerabilities/56772
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8446
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*

History

21 Nov 2024, 01:13

Type Values Removed Values Added
References () http://blogs.technet.com/msrc/archive/2010/03/09/security-advisory-981374-released.aspx - () http://blogs.technet.com/msrc/archive/2010/03/09/security-advisory-981374-released.aspx -
References () http://osvdb.org/62810 - () http://osvdb.org/62810 -
References () http://secunia.com/advisories/38860 - Vendor Advisory () http://secunia.com/advisories/38860 - Vendor Advisory
References () http://www.kb.cert.org/vuls/id/744549 - Patch, US Government Resource () http://www.kb.cert.org/vuls/id/744549 - Patch, US Government Resource
References () http://www.microsoft.com/technet/security/advisory/981374.mspx - Patch, Vendor Advisory () http://www.microsoft.com/technet/security/advisory/981374.mspx - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/38615 - () http://www.securityfocus.com/bid/38615 -
References () http://www.us-cert.gov/cas/techalerts/TA10-068A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA10-068A.html - US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA10-089A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA10-089A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2010/0567 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/0567 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/0744 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/0744 - Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/56772 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/56772 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8446 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8446 -

07 Dec 2023, 18:38

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:*

Information

Published : 2010-03-10 22:30

Updated : 2024-11-21 01:13


NVD link : CVE-2010-0806

Mitre link : CVE-2010-0806

CVE.ORG link : CVE-2010-0806


JSON object : View

Products Affected

microsoft

  • windows_server_2008
  • windows_server_2003
  • internet_explorer
  • windows_xp
  • windows_2003_server
  • windows_vista
  • windows_2000
CWE
CWE-399

Resource Management Errors