Summary
This host is missing a critical security update according to Microsoft Bulletin MS10-002.
Impact
Successful exploitation will let the attacker execute arbitrary codes via specially crafted HTML page in the context of the affected system and cause memory corruption.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/MS10-002
Insight
The Multiple flaws are due to:
- Use-after-free error in the 'mshtml.dll' library - Input validation error when processing URLs, which could allow a malicious web site to execute a binary from the local client system - Memory corruption error when the browser accesses certain objects, which could be exploited by remote attackers to execute arbitrary code - Browser disabling an HTML attribute in appropriately filtered response data, which could be exploited to execute script in the context of the logged-on user in a different Internet domain.
- Error when the browser attempts to access incorrectly initialized memory which could be exploited by remote attackers to execute arbitrary code.
Affected
Microsoft Internet Explorer version 5.x/6.x/7.x/8.x
References
Severity
Classification
-
CVE CVE-2009-4074, CVE-2010-0027, CVE-2010-0244, CVE-2010-0245, CVE-2010-0246, CVE-2010-0247, CVE-2010-0248, CVE-2010-0249 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
- Microsoft IIS Security Bypass Vulnerability (970483)
- Microsoft .NET Framework Privilege Elevation Vulnerability (3005210)
- Message Queuing Remote Code Execution Vulnerability (951071) - Remote
- Microsoft IIS FTP Server 'Malformed FTP List Request' DOS Vulnerability