Executive Summary
Summary | |
---|---|
Title | Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2079403) |
Informations | |||
---|---|---|---|
Name | MS10-051 | First vendor Publication | 2010-08-10 |
Vendor | Microsoft | Last vendor Modification | 2010-08-10 |
Severity (Vendor) | Critical | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.0 (August 10, 2010): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. An attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS10-051.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11730 | |||
Oval ID: | oval:org.mitre.oval:def:11730 | ||
Title: | Msxml2.XMLHTTP.3.0 Response Handling Memory Corruption Vulnerability | ||
Description: | Microsoft XML Core Services (aka MSXML) 3.0 does not properly handle HTTP responses, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted response, aka "Msxml2.XMLHTTP.3.0 Response Handling Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2561 | Version: | 5 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
ExploitDB Exploits
id | Description |
---|---|
2010-08-10 | Msxml2.XMLHTTP.3.0 Response Handling Memory Corruption (MS10-051) |
OpenVAS Exploits
Date | Description |
---|---|
2010-08-11 | Name : Microsoft Windows LSASS Denial of Service Vulnerability (975467) File : nvt/secpod_ms10-051.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
66973 | Microsoft XML Core Services Msxml2.XMLHTTP.3.0 ActiveX HTTP Response Handling... A memory corruption flaw exists in Microsoft XML Core Services. The 'Msxml2.XMLHTTP.3.0' ActiveX control fails to sanitize user-supplied input when handling invalid HTTP responses, resulting in memory corruption. With a specially crafted page or mail, a context-dependent attacker can execute arbitrary code. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows MSXML2 ActiveX malformed HTTP response RuleID : 21754 - Revision : 9 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows MSXML2 ActiveX malformed HTTP response RuleID : 18962 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows MSXML2 ActiveX malformed HTTP response RuleID : 18961 - Revision : 15 - Type : OS-WINDOWS |
2014-01-10 | Microsoft Windows MSXML2 ActiveX malformed HTTP response RuleID : 17133 - Revision : 17 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-10-30 | Name : The remote Windows host contains unsupported XML parsers. File : ms_msxml_unsupported.nasl - Type : ACT_GATHER_INFO |
2010-08-11 | Name : Arbitrary code can be executed on the remote host through its Microsoft XML C... File : smb_nt_ms10-051.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-26 23:00:31 |
|
2014-02-17 11:46:37 |
|
2014-01-19 21:30:30 |
|
2013-05-11 00:49:40 |
|