Vulnerabilities > CVE-2011-0094 - Resource Management Errors vulnerability in Microsoft Internet Explorer 6/7

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Layouts Handling Memory Corruption Vulnerability."

Common Weakness Enumeration (CWE)

Msbulletin

bulletin_idMS11-018
bulletin_url
date2011-04-12T00:00:00
impactRemote Code Execution
knowledgebase_id2497640
knowledgebase_url
severityCritical
titleCumulative Security Update for Internet Explorer

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS11-018.NASL
descriptionThe remote host is missing Internet Explorer (IE) Security Update 2497640. The installed version of IE is affected by several vulnerabilities that may allow an attacker to execute arbitrary code on the remote host.
last seen2020-06-01
modified2020-06-02
plugin id53375
published2011-04-13
reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/53375
titleMS11-018: Cumulative Security Update for Internet Explorer (2497640)

Oval

accepted2014-08-18T04:00:30.701-04:00
classvulnerability
contributors
  • nameDragos Prisaca
    organizationSymantec Corporation
  • nameMaria Mikhno
    organizationALTX-SOFT
  • nameMaria Mikhno
    organizationALTX-SOFT
definition_extensions
  • commentMicrosoft Windows XP (32-bit) is installed
    ovaloval:org.mitre.oval:def:1353
  • commentMicrosoft Internet Explorer 6 is installed
    ovaloval:org.mitre.oval:def:563
  • commentMicrosoft Windows XP x64 is installed
    ovaloval:org.mitre.oval:def:15247
  • commentMicrosoft Windows Server 2003 (32-bit) is installed
    ovaloval:org.mitre.oval:def:1870
  • commentMicrosoft Windows Server 2003 (x64) is installed
    ovaloval:org.mitre.oval:def:730
  • commentMicrosoft Windows Server 2003 (ia64) Gold is installed
    ovaloval:org.mitre.oval:def:396
  • commentMicrosoft Internet Explorer 6 is installed
    ovaloval:org.mitre.oval:def:563
  • commentMicrosoft Windows XP (32-bit) is installed
    ovaloval:org.mitre.oval:def:1353
  • commentMicrosoft Windows XP x64 is installed
    ovaloval:org.mitre.oval:def:15247
  • commentMicrosoft Windows Server 2003 (32-bit) is installed
    ovaloval:org.mitre.oval:def:1870
  • commentMicrosoft Windows Server 2003 (x64) is installed
    ovaloval:org.mitre.oval:def:730
  • commentMicrosoft Windows Server 2003 (ia64) Gold is installed
    ovaloval:org.mitre.oval:def:396
  • commentMicrosoft Internet Explorer 7 is installed
    ovaloval:org.mitre.oval:def:627
  • commentMicrosoft Windows Vista (32-bit) is installed
    ovaloval:org.mitre.oval:def:1282
  • commentMicrosoft Windows Vista x64 Edition is installed
    ovaloval:org.mitre.oval:def:2041
  • commentMicrosoft Windows Server 2008 (32-bit) is installed
    ovaloval:org.mitre.oval:def:4870
  • commentMicrosoft Windows Server 2008 (64-bit) is installed
    ovaloval:org.mitre.oval:def:5356
  • commentMicrosoft Windows Server 2008 (ia-64) is installed
    ovaloval:org.mitre.oval:def:5667
  • commentMicrosoft Internet Explorer 7 is installed
    ovaloval:org.mitre.oval:def:627
  • commentMicrosoft Windows Vista (32-bit) is installed
    ovaloval:org.mitre.oval:def:1282
  • commentMicrosoft Windows Vista x64 Edition is installed
    ovaloval:org.mitre.oval:def:2041
  • commentMicrosoft Windows Server 2008 (32-bit) is installed
    ovaloval:org.mitre.oval:def:4870
  • commentMicrosoft Windows Server 2008 (64-bit) is installed
    ovaloval:org.mitre.oval:def:5356
  • commentMicrosoft Windows Server 2008 (ia-64) is installed
    ovaloval:org.mitre.oval:def:5667
  • commentMicrosoft Internet Explorer 7 is installed
    ovaloval:org.mitre.oval:def:627
descriptionUse-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Layouts Handling Memory Corruption Vulnerability."
familywindows
idoval:org.mitre.oval:def:12463
statusaccepted
submitted2011-04-12T13:00:00
titleLayouts Handling Memory Corruption Vulnerability
version78

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 47190 CVE ID: CVE-2011-0094 Windows Internet Explorer,原称Microsoft Internet Explorer,简称MSIE(一般称为Internet Explorer,简称IE),是微软公司推出的一款网页浏览器。 Microsoft Internet Explorer在实现上存在布局处理释放后重用远程内存破坏漏洞,远程攻击者可利用此漏洞在应用程序中执行任意代码,造成拒绝服务。 IE访问未被正确初始化或已删除的对象时存在远程代码执行漏洞,攻击者通过构建特制的网页利用此漏洞。用户查看该网页时可致远程代码执行,成功利用可获取与登录用户相同的用户权限。如果用管理员权限登录则可获取受影响系统的完全控制权。攻击者就可以安装程序;查看、更改或删除数据;或以完全用户权限创建新账户。 Microsoft Internet Explorer 7.x Microsoft Internet Explorer 6.x 临时解决方法: * 以纯文本格式读取电子邮件 * 将“Internet"和本地内联网安全区域设置为“高”以在这些区域中禁用ActiveX控件和 Active脚本。 * 配置IE,在运行Active脚本之前提示或在互联网和内网安全区域中禁用Active脚本 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS11-018)以及相应补丁: MS11-018:Cumulative Security Update for Internet Explorer (2497640) 链接:http://www.microsoft.com/technet/security/bulletin/MS11-018.asp
idSSV:20478
last seen2017-11-19
modified2011-04-15
published2011-04-15
reporterRoot
titleMicrosoft IE布局处理释放后重用远程内存破坏漏洞(MS11-018)