Executive Summary
Summary | |
---|---|
Title | Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (981169) |
Informations | |||
---|---|---|---|
Name | MS10-022 | First vendor Publication | 2010-04-13 |
Vendor | Microsoft | Last vendor Modification | 2010-05-05 |
Severity (Vendor) | Important | Revision | 1.1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.6 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.1 (May 5, 2010): Corrected the registry key verification for VBScript 5.6 on Windows XP Service Pack 2.Summary: This security update resolves a publicly disclosed vulnerability in VBScript on Microsoft Windows that could allow remote code execution. This security update is rated Important for Microsoft Windows 2000, Windows XP, and Windows Server 2003. On Windows Server 2008, Windows Vista, Windows 7, and Windows Server 2008 R2, the vulnerable code is not exploitable, however, as the code is present, this update is provided as a defense-in-depth measure and has no severity rating. For more information, see the subsection, Affected and Non-Affected Software, in this section. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS10-022.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:7170 | |||
Oval ID: | oval:org.mitre.oval:def:7170 | ||
Title: | VBScript Help Keypress Vulnerability | ||
Description: | vbscript.dll in VBScript 5.1, 5.6, 5.7, and 5.8 in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, allows user-assisted remote attackers to execute arbitrary code by referencing a (1) local pathname, (2) UNC share pathname, or (3) WebDAV server with a crafted .hlp file in the fourth argument (aka helpfile argument) to the MsgBox function, leading to code execution involving winhlp32.exe when the F1 key is pressed, aka "VBScript Help Keypress Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0483 | Version: | 12 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | VBScript 5.1 VBScript 5.6 VBScript 5.7 VBScript 5.8 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:8654 | |||
Oval ID: | oval:org.mitre.oval:def:8654 | ||
Title: | Remote Code Execution vulnerability in VBScript | ||
Description: | vbscript.dll in VBScript 5.1, 5.6, 5.7, and 5.8 in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, allows user-assisted remote attackers to execute arbitrary code by referencing a (1) local pathname, (2) UNC share pathname, or (3) WebDAV server with a crafted .hlp file in the fourth argument (aka helpfile argument) to the MsgBox function, leading to code execution involving winhlp32.exe when the F1 key is pressed, aka "VBScript Help Keypress Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0483 | Version: | 1 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 2 | |
Os | 1 | |
Os | 3 |
OpenVAS Exploits
Date | Description |
---|---|
2010-04-14 | Name : Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232) File : nvt/secpod_ms10-022.nasl |
2010-03-10 | Name : MS Internet Explorer 'VBScript' Remote Code Execution Vulnerability File : nvt/gb_ms_ie_vbscript_remote_code_exec_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
62632 | Microsoft Windows VBScript MsgBox() Function HLP File Arbitrary Command Execu... Windows contains a flaw that may allow a context-dependent attacker to execute arbitrary code. The issue is triggered when a user is convinced to press F1 in response to a MessageBox originated from VBscript within a web page. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Internet Explorer MsgBox arbitrary code execution attempt RuleID : 19204 - Revision : 11 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer MsgBox arbitrary code execution attempt RuleID : 19203 - Revision : 11 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer .hlp samba share download attempt RuleID : 16452 - Revision : 13 - Type : BROWSER-IE |
Metasploit Database
id | Description |
---|---|
2010-02-26 | MS10-022 Microsoft Internet Explorer Winhlp32.exe MsgBox Code Execution |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-04-13 | Name : Arbitrary code can be executed on the remote host through the installed VBScr... File : smb_nt_ms10-022.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-05-23 13:17:13 |
|
2016-04-26 22:59:18 |
|
2014-03-29 05:18:51 |
|
2014-02-17 11:46:30 |
|
2014-01-19 21:30:27 |
|