CVE-2010-3962

Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue or "Uninitialized Memory Corruption Vulnerability," as exploited in the wild in November 2010.
References
Link Resource
http://blogs.technet.com/b/msrc/archive/2010/11/02/microsoft-releases-security-advisory-2458511.aspx Vendor Advisory
http://secunia.com/advisories/42091 Broken Link Vendor Advisory
http://www.exploit-db.com/exploits/15418 Third Party Advisory VDB Entry
http://www.exploit-db.com/exploits/15421 Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/899748 Third Party Advisory US Government Resource
http://www.microsoft.com/technet/security/advisory/2458511.mspx Patch Vendor Advisory
http://www.securityfocus.com/bid/44536 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1024676 Broken Link Third Party Advisory VDB Entry
http://www.symantec.com/connect/blogs/new-ie-0-day-used-targeted-attacks Not Applicable
http://www.us-cert.gov/cas/techalerts/TA10-348A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2010/2880 Broken Link Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/62962 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12279 Tool Signature
http://blogs.technet.com/b/msrc/archive/2010/11/02/microsoft-releases-security-advisory-2458511.aspx Vendor Advisory
http://secunia.com/advisories/42091 Broken Link Vendor Advisory
http://www.exploit-db.com/exploits/15418 Third Party Advisory VDB Entry
http://www.exploit-db.com/exploits/15421 Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/899748 Third Party Advisory US Government Resource
http://www.microsoft.com/technet/security/advisory/2458511.mspx Patch Vendor Advisory
http://www.securityfocus.com/bid/44536 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1024676 Broken Link Third Party Advisory VDB Entry
http://www.symantec.com/connect/blogs/new-ie-0-day-used-targeted-attacks Not Applicable
http://www.us-cert.gov/cas/techalerts/TA10-348A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2010/2880 Broken Link Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/62962 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12279 Tool Signature
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*

History

21 Nov 2024, 01:19

Type Values Removed Values Added
References () http://blogs.technet.com/b/msrc/archive/2010/11/02/microsoft-releases-security-advisory-2458511.aspx - Vendor Advisory () http://blogs.technet.com/b/msrc/archive/2010/11/02/microsoft-releases-security-advisory-2458511.aspx - Vendor Advisory
References () http://secunia.com/advisories/42091 - Broken Link, Vendor Advisory () http://secunia.com/advisories/42091 - Broken Link, Vendor Advisory
References () http://www.exploit-db.com/exploits/15418 - Third Party Advisory, VDB Entry () http://www.exploit-db.com/exploits/15418 - Third Party Advisory, VDB Entry
References () http://www.exploit-db.com/exploits/15421 - Third Party Advisory, VDB Entry () http://www.exploit-db.com/exploits/15421 - Third Party Advisory, VDB Entry
References () http://www.kb.cert.org/vuls/id/899748 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/899748 - Third Party Advisory, US Government Resource
References () http://www.microsoft.com/technet/security/advisory/2458511.mspx - Patch, Vendor Advisory () http://www.microsoft.com/technet/security/advisory/2458511.mspx - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/44536 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/44536 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1024676 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1024676 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.symantec.com/connect/blogs/new-ie-0-day-used-targeted-attacks - Not Applicable () http://www.symantec.com/connect/blogs/new-ie-0-day-used-targeted-attacks - Not Applicable
References () http://www.us-cert.gov/cas/techalerts/TA10-348A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA10-348A.html - Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2010/2880 - Broken Link, Vendor Advisory () http://www.vupen.com/english/advisories/2010/2880 - Broken Link, Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 - Patch, Vendor Advisory () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/62962 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/62962 - Third Party Advisory, VDB Entry
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12279 - Tool Signature () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12279 - Tool Signature

Information

Published : 2010-11-05 17:00

Updated : 2024-11-21 01:19


NVD link : CVE-2010-3962

Mitre link : CVE-2010-3962

CVE.ORG link : CVE-2010-3962


JSON object : View

Products Affected

microsoft

  • windows_server_2008
  • windows_server_2003
  • internet_explorer
  • windows_xp
  • windows_vista
  • windows_7
CWE
CWE-416

Use After Free