Executive Summary
Summary | |
---|---|
Title | Vulnerabilities in Microsoft Office Access ActiveX Controls Could Allow Remote Code Execution (982335) |
Informations | |||
---|---|---|---|
Name | MS10-044 | First vendor Publication | 2010-07-13 |
Vendor | Microsoft | Last vendor Modification | 2010-07-14 |
Severity (Vendor) | Critical | Revision | 1.1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.1 (July 14, 2010): Added a link to Microsoft Knowledge Base Article 982335 under Known Issues in the Executive Summary.Summary: This security update resolves two privately reported vulnerabilities in Microsoft Office Access ActiveX Controls. The vulnerabilities could allow remote code execution if a user opened a specially crafted Office file or viewed a Web page that instantiated Access ActiveX controls. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS10-044.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11756 | |||
Oval ID: | oval:org.mitre.oval:def:11756 | ||
Title: | ACCWIZ.dll Uninitialized Variable Vulnerability | ||
Description: | The FieldList ActiveX control in the Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 does not properly interact with the memory-access approach used by Internet Explorer and Office during instantiation, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTML document that references this control along with crafted persistent storage data, aka "ACCWIZ.dll Uninitialized Variable Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1881 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows 7 | Product(s): | Microsoft Access 2003 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:11907 | |||
Oval ID: | oval:org.mitre.oval:def:11907 | ||
Title: | Access ActiveX Control Vulnerability | ||
Description: | The Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 and 2007 SP1 and SP2 do not properly interact with the memory-allocation approach used by Internet Explorer during instantiation, which allows remote attackers to execute arbitrary code via a web site that references multiple ActiveX controls, as demonstrated by the ImexGrid and FieldList controls, aka "Access ActiveX Control Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0814 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows 7 | Product(s): | Microsoft Access 2003 Microsoft Access 2007 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 |
OpenVAS Exploits
Date | Description |
---|---|
2010-07-14 | Name : MS Office Access ActiveX Controls Remote Code Execution Vulnerabilities(982335) File : nvt/secpod_ms10-044.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
66295 | Microsoft IE / Office FieldList ActiveX (ACCWIZ.dll) Remote Code Execution Microsoft Office Access contains a flaw related to the way the FieldList ActiveX control in the Microsoft Access Wizard Controls in ACCWIZ.dll is instantiated by Internet Explorer and Office. This may allow a context-dependent attacker to corrupt memory and execute arbitrary code via crafted persisted storage data in an HTML document. |
66294 | Microsoft Office Access AccWizObjects ActiveX Remote Code Execution Microsoft Office Access contains a flaw related to the Microsoft Access Wizard Controls in ACCWIZ.dll. The issue is triggered when an attacker loads three specific controls in a specific order. This may allow a context-dependent attacker to execute arbitrary code via a crafted web site. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-07-15 | IAVM : 2010-A-0094 - Multiple Vulnerabilities in Microsoft Office Access Severity : Category II - VMSKEY : V0024850 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-03-24 | Microsoft Office Access multiple control instantiation memory corruption attempt RuleID : 33548 - Revision : 2 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Access Wizard control memory corruption ActiveX clsid access RuleID : 19141 - Revision : 14 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Access ACCWIZ library release after free attempt - 2 RuleID : 17039 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Access ACCWIZ library release after free attempt - 1 RuleID : 17038 - Revision : 15 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Office Access multiple control instantiation memory corruption attempt RuleID : 17037 - Revision : 13 - Type : BROWSER-PLUGINS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-07-13 | Name : The version of Microsoft Office on the remote Windows host has multiple code ... File : smb_nt_ms10-044.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-03-24 21:25:58 |
|
2014-02-17 11:46:36 |
|
2014-01-19 21:30:29 |
|
2013-11-11 12:41:18 |
|