Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue or "Uninitialized Memory Corruption Vulnerability," as exploited in the wild in November 2010.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
28 Feb 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
References | (EXPLOIT-DB) http://www.exploit-db.com/exploits/15418 - Third Party Advisory, VDB Entry | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12279 - Tool Signature | |
References | (CONFIRM) http://www.microsoft.com/technet/security/advisory/2458511.mspx - Patch, Vendor Advisory | |
References | (CERT-VN) http://www.kb.cert.org/vuls/id/899748 - Third Party Advisory, US Government Resource | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/2880 - Broken Link, Vendor Advisory | |
References | (MISC) http://www.symantec.com/connect/blogs/new-ie-0-day-used-targeted-attacks - Not Applicable | |
References | (SECTRACK) http://www.securitytracker.com/id?1024676 - Broken Link, Third Party Advisory, VDB Entry | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/62962 - Third Party Advisory, VDB Entry | |
References | (EXPLOIT-DB) http://www.exploit-db.com/exploits/15421 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/42091 - Broken Link, Vendor Advisory | |
References | (CERT) http://www.us-cert.gov/cas/techalerts/TA10-348A.html - Third Party Advisory, US Government Resource | |
References | (MS) https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 - Patch, Vendor Advisory | |
References | (BID) http://www.securityfocus.com/bid/44536 - Broken Link, Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:* cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:* cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:* cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:* |
23 Jul 2021, 15:12
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:microsoft:ie:8:*:*:*:*:*:*:* cpe:2.3:a:microsoft:ie:6:*:*:*:*:*:*:* |
cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:* |
Information
Published : 2010-11-05 17:00
Updated : 2024-02-04 17:54
NVD link : CVE-2010-3962
Mitre link : CVE-2010-3962
CVE.ORG link : CVE-2010-3962
JSON object : View
Products Affected
microsoft
- windows_7
- windows_xp
- internet_explorer
- windows_server_2008
- windows_vista
- windows_server_2003
CWE
CWE-416
Use After Free