Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-1262 | First vendor Publication | 2010-06-08 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Internet Explorer 6 SP1 and SP2, 7, and 8 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, related to the CStyleSheet object and a free of the root container, aka "Memory Corruption Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1262 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:7406 | |||
Oval ID: | oval:org.mitre.oval:def:7406 | ||
Title: | Memory Corruption Vulnerability (CVE-2010-1262) | ||
Description: | Microsoft Internet Explorer 6 SP1 and SP2, 7, and 8 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, related to the CStyleSheet object and a free of the root container, aka "Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1262 | Version: | 11 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
OpenVAS Exploits
Date | Description |
---|---|
2010-06-09 | Name : Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (9... File : nvt/secpod_ms10-032.nasl |
2010-06-09 | Name : Microsoft Internet Explorer Multiple Vulnerabilities (982381) File : nvt/secpod_ms10-035.nasl |
2010-02-08 | Name : Microsoft Internet Explorer Information Disclosure Vulnerability (980088) File : nvt/gb_ms_ie_npl_info_disc_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
65212 | Microsoft IE CStyleSheet Object Handling Memory Corruption A memory corruption flaw exists in Microsoft Internet Explorer. The program fails to sanitize user-supplied input when a use-after-free error occurs due to an invalid pointer being utilized during use of CStyleSheets, resulting in memory corruption. With a specially crafted page containing a CStyleSheet, a context-dependent attacker can execute arbitrary code. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-12-16 | Microsoft Internet Explorer style sheet array memory corruption attempt RuleID : 32532 - Revision : 3 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer oversize recordset object cache size exploit attempt RuleID : 18280 - Revision : 15 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer style sheet array memory corruption attempt RuleID : 16659 - Revision : 17 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer 8 cross-site scripting attempt RuleID : 16658 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer security zone restriction bypass attempt RuleID : 16637 - Revision : 12 - Type : BROWSER-IE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-06-09 | Name : Arbitrary code can be executed on the remote host through a web browser. File : smb_nt_ms10-035.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:08:26 |
|
2024-11-28 12:21:36 |
|
2023-12-07 21:28:04 |
|
2021-07-27 00:24:32 |
|
2021-07-24 01:44:10 |
|
2021-07-24 01:07:04 |
|
2021-07-23 21:24:59 |
|
2021-07-23 17:24:37 |
|
2020-05-23 00:25:34 |
|
2018-10-31 00:20:03 |
|
2018-10-13 00:22:56 |
|
2018-10-11 00:19:50 |
|
2018-09-20 12:08:19 |
|
2017-09-19 09:23:43 |
|
2016-09-30 01:02:23 |
|
2016-08-31 12:02:06 |
|
2016-08-05 12:02:27 |
|
2016-06-29 00:12:07 |
|
2016-04-26 19:42:55 |
|
2014-12-16 21:23:20 |
|
2014-02-17 10:54:39 |
|
2014-01-19 21:26:45 |
|
2013-05-10 23:21:49 |
|