Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory in certain circumstances involving use of Microsoft Word to read Word documents, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 01:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://support.avaya.com/css/P8/documents/100113324 - | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-285A.html - US Government Resource | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6832 - |
07 Dec 2023, 18:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:* |
Information
Published : 2010-10-13 19:00
Updated : 2024-11-21 01:18
NVD link : CVE-2010-3331
Mitre link : CVE-2010-3331
CVE.ORG link : CVE-2010-3331
JSON object : View
Products Affected
microsoft
- windows_server_2008
- windows_7
- windows_server_2003
- internet_explorer
- windows_xp
- windows_2003_server
- windows_vista
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')