Overview
Microsoft Internet Explorer contains a use-after-free vulnerability in the handling of CSS, which may allow a remote, unauthenticated attacker to execute arbitrary code.
Description
Microsoft Internet Explorer contains a vulnerability caused by a use-after-free error within the mshtml.dll library. This vulnerability can be exploited when processing a web page referencing a Cascading Style Sheet (CSS) file that includes various @import rules. We have confirmed that Internet Explorer 6, 7, and 8 are affected. Exploit code for this vulnerability is publicly available. |
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. |
Solution
Apply an update |
Enable Data Execution Prevention (DEP) on Internet Explorer |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.microsoft.com/technet/security/advisory/2488013.mspx
- http://threatpost.com/en_us/blogs/new-remotely-exploitable-bug-found-internet-explorer-121010
- http://www.breakingpointsystems.com/community/blog/ie-vulnerability/
- http://www.wooyun.org/bugs/wooyun-2010-0885
- http://seclists.org/fulldisclosure/2010/Dec/110
- http://secunia.com/advisories/42510
- http://blogs.technet.com/b/srd/archive/2011/01/11/new-workaround-included-in-security-advisory-2488013.aspx
- http://www.microsoft.com/technet/security/bulletin/ms11-003.mspx
Acknowledgements
WooYun publicly reported this vulnerability.
This document was written by Michael Orlando.
Other Information
CVE IDs: | CVE-2010-3971 |
Severity Metric: | 14.65 |
Date Public: | 2010-12-10 |
Date First Published: | 2010-12-13 |
Date Last Updated: | 2011-02-08 18:25 UTC |
Document Revision: | 30 |