Executive Summary
Summary | |
---|---|
Title | Microsoft Updates for Multiple Vulnerabilities |
Informations | |||
---|---|---|---|
Name | TA10-131A | First vendor Publication | 2010-05-11 |
Vendor | US-CERT | Last vendor Modification | 2010-05-11 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft has released updates to address vulnerabilities in Microsoft Outlook Express, Microsoft Windows Mail, Microsoft Windows Live Mail, Microsoft Office, and Microsoft Visual Basic for Applications. I. Description Microsoft has released security bulletins for multiple vulnerabilities in Microsoft Outlook Express, Microsoft Windows Mail, Microsoft Windows Live Mail, Microsoft Office, and Microsoft Visual Basic for Applications. These bulletins are described in the Microsoft Security Bulletin Summary for May 2010. Third-party software that distributes VBE6.DLL may also be affected. If the third-party application follows the best practices for using a shared component as a side-by-side assembly, then the component will be updated by the update provided by MS10-031. II. Impact A remote, unauthenticated attacker could execute arbitrary code or cause a vulnerable application to crash. III. Solution Apply updates from Microsoft Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for May 2010. The security bulletin describes any known issues related to the updates. |
Original Source
Url : http://www.us-cert.gov/cas/techalerts/TA10-131A.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
50 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6734 | |||
Oval ID: | oval:org.mitre.oval:def:6734 | ||
Title: | Outlook Express and Windows Mail Integer Overflow Vulnerability | ||
Description: | Integer overflow in inetcomm.dll in Microsoft Outlook Express 5.5 SP2, 6, and 6 SP1; Windows Live Mail on Windows XP SP2 and SP3, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7; and Windows Mail on Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote e-mail servers and man-in-the-middle attackers to execute arbitrary code via a crafted (1) POP3 or (2) IMAP response, as demonstrated by a certain +OK response on TCP port 110, aka "Outlook Express and Windows Mail Integer Overflow Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0816 | Version: | 10 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft Outlook Express Microsoft Windows Mail Microsoft Windows Live Mail |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7074 | |||
Oval ID: | oval:org.mitre.oval:def:7074 | ||
Title: | VBE6.DLL Stack Memory Corruption Vulnerability | ||
Description: | VBE6.DLL in Microsoft Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Visual Basic for Applications (VBA), and VBA SDK 6.3 through 6.5 does not properly search for ActiveX controls that are embedded in documents, which allows remote attackers to execute arbitrary code via a crafted document, aka "VBE6.DLL Stack Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-0815 | Version: | 5 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 | Product(s): | Microsoft Office 2000 Microsoft Office XP Microsoft Office 2003 Microsoft Office 2007 Microsoft Visual Basic for Applications |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 4 | |
Application | 3 | |
Application | 1 | |
Application | 3 | |
Application | 1 | |
Application | 1 |
ExploitDB Exploits
id | Description |
---|---|
2010-05-11 | Microsoft Windows Outlook Express and Windows Mail Integer Overflow |
OpenVAS Exploits
Date | Description |
---|---|
2010-05-13 | Name : Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerabilit... File : nvt/secpod_ms10-030.nasl |
2010-05-13 | Name : Microsoft Visual Basic Remote Code Execution Vulnerability (978213) File : nvt/secpod_ms10-031.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
64530 | Microsoft Outlook Express / Windows Mail STAT Response Overflow Outlook Express and Windows Live Mail are prone to an overflow condition. The application fails to properly sanitize server-supplied input resulting in an integer overflow. With a specially crafted STAT response, a remote attacker can potentially cause arbitrary code execution. |
64529 | Microsoft Visual Basic for Applications VBE6.dll Single-Byte Stack Overwrite |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-05-13 | IAVM : 2010-B-0039 - Microsoft Outlook Express and Windows Mail Remote Code Executio Vulnerability Severity : Category II - VMSKEY : V0024168 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-12 | Microsoft VBE6.dll stack corruption attempt RuleID : 50959 - Revision : 1 - Type : FILE-OFFICE |
2014-01-10 | Microsoft Windows Mail remote code execution attempt RuleID : 16595 - Revision : 16 - Type : SERVER-MAIL |
2014-01-10 | Microsoft VBE6.dll stack corruption attempt RuleID : 16593 - Revision : 16 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-05-11 | Name : An integer overflow vulnerability is present on the remote host due to an iss... File : smb_nt_ms10-030.nasl - Type : ACT_GATHER_INFO |
2010-05-11 | Name : Arbitrary code can be executed on the remote host through Visual Basic for Ap... File : smb_nt_ms10-031.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2013-05-11 00:53:48 |
|