Executive Summary
Summary | |
---|---|
Title | Cumulative Security Update for Internet Explorer (947864) |
Informations | |||
---|---|---|---|
Name | MS08-024 | First vendor Publication | 2008-04-08 |
Vendor | Microsoft | Last vendor Modification | 2009-02-18 |
Severity (Vendor) | Critical | Revision | 2.2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V2.2 (February 18, 2009): Added unaffected server core notation for Windows Server 2008 for 32-bit Systems and Windows Server 2008 for x64-based Systems.Summary: This critical security update resolves one privately reported vulnerability. The vulnerability could allow remote code execution if a user viewed a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS08-024.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:5563 | |||
Oval ID: | oval:org.mitre.oval:def:5563 | ||
Title: | Data Stream Handling Memory Corruption Vulnerability | ||
Description: | Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 through SP1, and 7 allows remote attackers to execute arbitrary code via a crafted data stream that triggers memory corruption, as demonstrated using an invalid MIME-type that does not have a registered handler. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2008-1085 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-01-10 | Name : Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulner... File : nvt/gb_ms08-024.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
44205 | Microsoft IE Data Stream Handling Memory Corruption A memory corruption flaw exists in Internet Explorer. The program fails to validate data streams resulting in a use-after-free condition. With a specially crafted website, a context-dependent attacker can cause arbitrary code execution resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Internet Explorer data stream memory corruption attempt RuleID : 13677 - Revision : 19 - Type : BROWSER-IE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-04-08 | Name : Arbitrary code can be executed on the remote host through the web client. File : smb_nt_ms08-024.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:45:57 |
|
2014-01-19 21:30:11 |
|
2013-05-11 00:49:19 |
|