Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2010-1263 | First vendor Publication | 2010-06-08 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Windows Shell and WordPad in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7; Microsoft Office XP SP3; Office 2003 SP3; and Office System 2007 SP1 and SP2 do not properly validate COM objects during instantiation, which allows remote attackers to execute arbitrary code via a crafted file, aka "COM Validation Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1263 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:7286 | |||
Oval ID: | oval:org.mitre.oval:def:7286 | ||
Title: | COM Validation Vulnerability | ||
Description: | Windows Shell and WordPad in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7; Microsoft Office XP SP3; Office 2003 SP3; and Office System 2007 SP1 and SP2 do not properly validate COM objects during instantiation, which allows remote attackers to execute arbitrary code via a crafted file, aka "COM Validation Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1263 | Version: | 26 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows 7 | Product(s): | Microsoft Office XP Microsoft Excel 2003 Microsoft PowerPoint 2003 Microsoft Publisher 2003 Microsoft Visio 2003 Microsoft Word 2003 Microsoft Excel 2007 Microsoft PowerPoint 2007 Microsoft Publisher 2007 Microsoft Visio 2007 Microsoft Word 2007 Microsoft Wordpad |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 |
ExploitDB Exploits
id | Description |
---|---|
2010-10-16 | Microsoft Office HtmlDlgHelper Class Memory Corruption |
OpenVAS Exploits
Date | Description |
---|---|
2010-10-13 | Name : Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882) File : nvt/secpod_ms10-083.nasl |
2010-06-09 | Name : Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (9... File : nvt/secpod_ms10-032.nasl |
2010-06-09 | Name : Microsoft Office COM Validation Remote Code Execution Vulnerability (983235) File : nvt/secpod_ms10-036.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
65219 | Microsoft Windows / Office COM Object Instantiation Validation Remote Code Ex... Microsoft Windows and Office fail to properly validate COM objects during instantiation. This may allow a context-dependent attacker to use a crafted file to execute arbitrary code. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-10-14 | IAVM : 2010-A-0134 - Microsoft Windows COM Validation Remote Code Execution Vulnerability Severity : Category II - VMSKEY : V0025530 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-09-19 | Microsoft Windows Media Player Firefox plugin memory corruption attempt RuleID : 54833 - Revision : 1 - Type : FILE-MULTIMEDIA |
2014-01-10 | Microsoft Windows Media Player Firefox plugin memory corruption attempt RuleID : 17773 - Revision : 14 - Type : FILE-MULTIMEDIA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-10-13 | Name : The remote windows host is affected by a remote code execution vulnerability. File : smb_nt_ms10-083.nasl - Type : ACT_GATHER_INFO |
2010-06-09 | Name : Arbitrary code can be executed on the remote host through opening a Microsoft... File : smb_nt_ms10-036.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:08:26 |
|
2024-11-28 12:21:36 |
|
2021-05-04 12:11:21 |
|
2021-04-22 01:11:59 |
|
2020-05-23 00:25:34 |
|
2018-10-13 00:22:56 |
|
2017-09-19 09:23:43 |
|
2016-04-26 19:42:56 |
|
2014-02-17 10:54:39 |
|
2013-11-11 12:38:44 |
|
2013-05-10 23:21:49 |
|