Overview
An invalid pointer reference within Microsoft Internet Explorer may lead to execution of arbitrary code.
Description
Microsoft Internet Explorer contains a memory corruption vulnerability, which can result in an invalid pointer being accessed after an object is incorrectly initialized or has been deleted. In certain circumstances, the invalid pointer access can be leveraged by an attacker to execute arbitrary code. This vulnerability is being actively exploited, and exploit code is publically available. Please see Microsoft Security Advisory 979352 for further information. |
Impact
By convincing a user to load a specially crafted HTML document or Microsoft Office document, a remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition. |
Solution
Apply an update |
Enable Data Execution Prevention (DEP) on Internet Explorer 6 or Internet Explorer 7
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.microsoft.com/technet/security/advisory/979352.mspx
- http://www.microsoft.com/technet/security/bulletin/ms10-002.mspx
- http://support.microsoft.com/kb/979352
- http://blogs.technet.com/msrc/archive/2010/01/18/advisory-979352-update-for-monday-january-18.aspx
- http://blogs.technet.com/srd/archive/2010/01/18/additional-information-about-dep-and-the-internet-explorer-0day-vulnerability.aspx
- http://office.microsoft.com/en-us/help/HA100310671033.aspx
- http://blogs.technet.com/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx
- http://blogs.technet.com/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx
Acknowledgements
This vulnerability was reported by Microsoft. Microsoft credits Google Inc., MANDIANT, Adobe, and McAfee.
This document was written by David Warren.
Other Information
CVE IDs: | CVE-2010-0249 |
Severity Metric: | 41.04 |
Date Public: | 2010-01-14 |
Date First Published: | 2010-01-14 |
Date Last Updated: | 2010-01-21 21:14 UTC |
Document Revision: | 64 |