Executive Summary
Summary | |
---|---|
Title | Vulnerability in JScript and VBScript Scripting Engines Could Allow Remote Code Execution (2514666) |
Informations | |||
---|---|---|---|
Name | MS11-031 | First vendor Publication | 2011-04-12 |
Vendor | Microsoft | Last vendor Modification | 2011-04-20 |
Severity (Vendor) | Critical | Revision | 1.1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.1 (April 20, 2011): Bulletin updated to clarify that the JScript 5.8 and VBScript 5.8 update (KB2510531) also replaces MS09-045, in addition to MS10-022, for all supported editions of Windows XP, Windows Server 2003, and Windows Vista.Summary: This security update resolves a privately reported vulnerability in the JScript and VBScript scripting engines. The vulnerability could allow remote code execution if a user visited a specially crafted Web site. An attacker would have no way to force users to visit the Web site. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker's Web site. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS11-031.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12673 | |||
Oval ID: | oval:org.mitre.oval:def:12673 | ||
Title: | Scripting Memory Reallocation Vulnerability | ||
Description: | Multiple integer overflows in the Microsoft (1) JScript 5.6 through 5.8 and (2) VBScript 5.6 through 5.8 scripting engines allow remote attackers to execute arbitrary code via a crafted web page, aka "Scripting Memory Reallocation Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2011-0663 | Version: | 17 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | VBScript 5.6 VBScript 5.7 VBScript 5.8 JScript 5.6 JScript 5.7 JScript 5.8 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 | |
Application | 3 |
OpenVAS Exploits
Date | Description |
---|---|
2011-04-13 | Name : Microsoft JScript and VBScript Scripting Engines Remote Code Execution Vulner... File : nvt/secpod_ms11-031.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
71774 | Microsoft Windows JScript / VBScript Engine Scripting Memory Reallocation Ove... Microsoft Windows is prone to an overflow condition. The JScript and VBScript scripting engines fail to properly sanitize user-supplied input resulting in an integer overflow. With a specially crafted web page, a context-dependent attacker can potentially execute arbitrary code. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2011-04-14 | IAVM : 2011-A-0048 - Microsoft Windows Scripting Memory Reallocation Vulnerability Severity : Category II - VMSKEY : V0026526 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-04-13 | Name : Arbitrary code can be executed on the remote host through the installed JScri... File : smb_nt_ms11-031.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-26 23:03:34 |
|
2014-02-17 11:46:57 |
|
2013-11-11 12:41:22 |
|
2013-05-11 00:49:48 |
|