Vulnerabilities > CVE-2010-0806 - Resource Management Errors vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, aka "Uninitialized Memory Corruption Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 | |
OS | 17 |
Common Weakness Enumeration (CWE)
Exploit-Db
description Internet Explorer DHTML Behaviors Use After Free. CVE-2010-0806. Remote exploit for windows platform id EDB-ID:16590 last seen 2016-02-02 modified 2010-12-14 published 2010-12-14 reporter metasploit source https://www.exploit-db.com/download/16590/ title Microsoft Internet Explorer - DHTML Behaviors Use After Free description Microsoft Internet Explorer iepeers.dll Use-After-Free Exploit (meta). CVE-2010-0806. Remote exploit for windows platform id EDB-ID:11683 last seen 2016-02-01 modified 2010-03-10 published 2010-03-10 reporter Trancer source https://www.exploit-db.com/download/11683/ title Microsoft Internet Explorer iepeers.dll Use-After-Free Exploit meta
Metasploit
description | This module exploits a use-after-free vulnerability within the DHTML behaviors functionality of Microsoft Internet Explorer versions 6 and 7. This bug was discovered being used in-the-wild and was previously known as the "iepeers" vulnerability. The name comes from Microsoft's suggested workaround to block access to the iepeers.dll file. According to Nico Waisman, "The bug itself is when trying to persist an object using the setAttribute, which end up calling VariantChangeTypeEx with both the source and the destination being the same variant. So if you send as a variant an IDISPATCH the algorithm will try to do a VariantClear of the destination before using it. This will end up on a call to PlainRelease which deref the reference and clean the object." NOTE: Internet Explorer 8 and Internet Explorer 5 are not affected. |
id | MSF:EXPLOIT/WINDOWS/BROWSER/MS10_018_IE_BEHAVIORS |
last seen | 2020-03-08 |
modified | 2019-05-23 |
published | 2010-04-07 |
references |
|
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/ms10_018_ie_behaviors.rb |
title | MS10-018 Microsoft Internet Explorer DHTML Behaviors Use After Free |
Msbulletin
bulletin_id | MS10-018 |
bulletin_url | |
date | 2010-03-30T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 980182 |
knowledgebase_url | |
severity | Critical |
title | Cumulative Security Update for Internet Explorer |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS10-018.NASL |
description | The remote host is missing IE Security Update 980182. The remote version of IE is affected by several vulnerabilities that may allow an attacker to execute arbitrary code on the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 45378 |
published | 2010-03-30 |
reporter | This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/45378 |
title | MS10-018: Cumulative Security Update for Internet Explorer (980182) |
code |
|
Oval
accepted | 2014-08-18T04:06:35.819-04:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
description | Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, aka "Uninitialized Memory Corruption Vulnerability." | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:8446 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2010-03-30T13:00:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
title | Uninitialized Memory Corruption Vulnerability (CVE-2010-0806) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 76 |
Packetstorm
data source https://packetstormsecurity.com/files/download/87871/ms10_018_ie_behaviors.rb.txt id PACKETSTORM:87871 last seen 2016-12-05 published 2010-04-01 reporter Nanika source https://packetstormsecurity.com/files/87871/Internet-Explorer-DTHML-Behaviors-Use-After-Free.html title Internet Explorer DTHML Behaviors Use After Free data source https://packetstormsecurity.com/files/download/87102/ie_iepeers_pointer.rb.txt id PACKETSTORM:87102 last seen 2016-12-05 published 2010-03-11 reporter Trancer source https://packetstormsecurity.com/files/87102/Microsoft-Internet-Explorer-iepeers.dll-Use-After-Free.html title Microsoft Internet Explorer iepeers.dll Use After Free
Saint
bid | 38615 |
description | Internet Explorer iepeers.dll use-after-free vulnerability |
id | win_patch_ie_v6,win_patch_ie_v7 |
osvdb | 62810 |
title | ie_iepeers_useafterfree |
type | client |
Seebug
bulletinFamily exploit description No description provided by source. id SSV:67876 last seen 2017-11-19 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-67876 title Microsoft Internet Explorer iepeers.dll Use-After-Free Exploit (meta) bulletinFamily exploit description No description provided by source. id SSV:71104 last seen 2017-11-19 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-71104 title Internet Explorer DHTML Behaviors Use After Free bulletinFamily exploit description BUGTRAQ ID: 38615 CVE ID: CVE-2010-0806 Internet Explorer是Windows操作系统中默认捆绑的web浏览器。 Internet Explorer通过使用iepeers.dll组件提供对Web文件夹和打印的支持,该组件中存在释放后使用错误。如果用户加载了特制的HTML文档或 Office文件,未经认证的远程攻击者就可以导致拒绝服务或执行任意代码。 Microsoft Internet Explorer 7.0 Microsoft Internet Explorer 6.0 SP1 Microsoft Internet Explorer 6.0 临时解决方法: Windows用户可以采用下面几种临时解决方案来减少漏洞威胁: * 修改系统对iepeers.dll文件的访问权限。 对32位系统,执行如下命令: Echo y| cacls %WINDIR%\SYSTEM32\iepeers.DLL /E /P everyone:N 对64位系统,执行如下命令: Echo y| cacls %WINDIR%\SYSWOW64\iepeers.DLL /E /P everyone:N 调整访问权限以后,打印和Web文件夹之类的扩展功能可能受到影响。 * 将Internet Explorer配置为在Internet和本地Intranet安全区域中运行ActiveX控件和活动脚本之前进行提示。 * 将Internet 和本地Intranet安全区域设置设为“高”,以便在这些区域中运行ActiveX控件和活动脚本之前进行提示。 * 对Internet Explorer 6 SP2或Internet Explorer 7启用DEP。 方法1:下载安装微软提供的开启DEP补丁: http://go.microsoft.com/?linkid=9668626 方法2:手工开启全局DEP: 对于Windows XP用户,如果之前没有手工调整过DEP策略,请点击开始菜单的“运行”,输入“sysdm.cpl”,点击“确定”。点击“高级”分页,然后点击“性能”分栏中的“设置”按钮。选择“数据执行保护”分页,选择“除所选之外,为所有程序和服务启用数据执行保护”。然后点击下面的“确定”按钮。这个操作可能需要重新启动系统后生效。 厂商补丁: Microsoft --------- 微软已经发布了涉及此漏洞的安全公告,但还没有发布安全补丁,我们建议在安装官方补丁之前应用临时解决方法以降低漏洞的威胁: http://www.microsoft.com/technet/security/advisory/981374.mspx id SSV:19247 last seen 2017-11-19 modified 2010-03-10 published 2010-03-10 reporter Root title Microsoft IE畸形对象操作内存破坏漏洞
References
- http://blogs.technet.com/msrc/archive/2010/03/09/security-advisory-981374-released.aspx
- http://blogs.technet.com/msrc/archive/2010/03/09/security-advisory-981374-released.aspx
- http://osvdb.org/62810
- http://osvdb.org/62810
- http://secunia.com/advisories/38860
- http://secunia.com/advisories/38860
- http://www.kb.cert.org/vuls/id/744549
- http://www.kb.cert.org/vuls/id/744549
- http://www.microsoft.com/technet/security/advisory/981374.mspx
- http://www.microsoft.com/technet/security/advisory/981374.mspx
- http://www.securityfocus.com/bid/38615
- http://www.securityfocus.com/bid/38615
- http://www.us-cert.gov/cas/techalerts/TA10-068A.html
- http://www.us-cert.gov/cas/techalerts/TA10-068A.html
- http://www.us-cert.gov/cas/techalerts/TA10-089A.html
- http://www.us-cert.gov/cas/techalerts/TA10-089A.html
- http://www.vupen.com/english/advisories/2010/0567
- http://www.vupen.com/english/advisories/2010/0567
- http://www.vupen.com/english/advisories/2010/0744
- http://www.vupen.com/english/advisories/2010/0744
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56772
- https://exchange.xforce.ibmcloud.com/vulnerabilities/56772
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8446
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8446