8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.967 High
EPSS
Percentile
99.6%
An invalid pointer reference within Microsoft Internet Explorer may lead to execution of arbitrary code.
Microsoft Internet Explorer contains a memory corruption vulnerability, which can result in an invalid pointer being accessed after an object is incorrectly initialized or has been deleted. In certain circumstances, the invalid pointer access can be leveraged by an attacker to execute arbitrary code. This vulnerability is being actively exploited, and exploit code is publically available.
Please see Microsoft Security Advisory 979352 for further information.
By convincing a user to load a specially crafted HTML document or Microsoft Office document, a remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition.
Apply an update
Microsoft has released an update to address the issue. See Microsoft Security Bulletin MS10-002 for more information. Users are encouraged to consider additional mitigations listed in Microsoft Security Advisory 979352:
Enable Data Execution Prevention (DEP) on Internet Explorer 6 or Internet Explorer 7
Microsoft has published more information on DEP as a mitigation for this vulnerability. DEP should not be treated as a complete workaround, but DEP can mitigate the execution of attacker-supplied code in some cases. Microsoft has published detailed technical information about DEP in Security Research & Defense blog posts “Understanding DEP as a mitigation technology” part 1 and part 2. Use of DEP should be considered in conjunction with other mitigations described in this document.
Set the Internet zone security setting to “High”
Setting the Internet zone security setting to “High” will result in the user being prompted before running ActiveX controls and Active Scripting, which may reduce the risk of certain attack vectors.
Disable Active Scripting
Disabling Active Scripting will prevent Active Scripting from running, which may reduce the risk of certain attack vectors.
Disable ActiveX Controls in Microsoft Office
This vulnerability can be exploited through a Microsoft Office document containing an ActiveX control. Disabling ActiveX controls in Microsoft Office blocks this attack vector. For detailed instructions on how to disable ActiveX in Microsoft Office, see the “Workarounds” section of Microsoft Security Advisory 979352 and the “Enable or disable ActiveX controls in Office documents” Microsoft Office Online article.
492515
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: January 14, 2010
Affected
We have not received a statement from the vendor.
Please see Microsoft Security Advisory 979352 for more information
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was reported by Microsoft. Microsoft credits Google Inc., MANDIANT, Adobe, and McAfee.
This document was written by David Warren.
CVE IDs: | CVE-2010-0249 |
---|---|
Severity Metric: | 41.04 Date Public: |
blogs.technet.com/msrc/archive/2010/01/18/advisory-979352-update-for-monday-january-18.aspx
blogs.technet.com/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx
blogs.technet.com/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx
blogs.technet.com/srd/archive/2010/01/18/additional-information-about-dep-and-the-internet-explorer-0day-vulnerability.aspx
office.microsoft.com/en-us/help/HA100310671033.aspx
support.microsoft.com/kb/979352
www.microsoft.com/technet/security/advisory/979352.mspx
www.microsoft.com/technet/security/bulletin/ms10-002.mspx
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.967 High
EPSS
Percentile
99.6%