Vulnerabilities > CVE-2011-0094 - Resource Management Errors vulnerability in Microsoft Internet Explorer 6/7
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Layouts Handling Memory Corruption Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 | |
OS | 15 |
Common Weakness Enumeration (CWE)
Msbulletin
bulletin_id | MS11-018 |
bulletin_url | |
date | 2011-04-12T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2497640 |
knowledgebase_url | |
severity | Critical |
title | Cumulative Security Update for Internet Explorer |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS11-018.NASL |
description | The remote host is missing Internet Explorer (IE) Security Update 2497640. The installed version of IE is affected by several vulnerabilities that may allow an attacker to execute arbitrary code on the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 53375 |
published | 2011-04-13 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/53375 |
title | MS11-018: Cumulative Security Update for Internet Explorer (2497640) |
Oval
accepted | 2014-08-18T04:00:30.701-04:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
description | Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Layouts Handling Memory Corruption Vulnerability." | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:12463 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2011-04-12T13:00:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
title | Layouts Handling Memory Corruption Vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 78 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 47190 CVE ID: CVE-2011-0094 Windows Internet Explorer,原称Microsoft Internet Explorer,简称MSIE(一般称为Internet Explorer,简称IE),是微软公司推出的一款网页浏览器。 Microsoft Internet Explorer在实现上存在布局处理释放后重用远程内存破坏漏洞,远程攻击者可利用此漏洞在应用程序中执行任意代码,造成拒绝服务。 IE访问未被正确初始化或已删除的对象时存在远程代码执行漏洞,攻击者通过构建特制的网页利用此漏洞。用户查看该网页时可致远程代码执行,成功利用可获取与登录用户相同的用户权限。如果用管理员权限登录则可获取受影响系统的完全控制权。攻击者就可以安装程序;查看、更改或删除数据;或以完全用户权限创建新账户。 Microsoft Internet Explorer 7.x Microsoft Internet Explorer 6.x 临时解决方法: * 以纯文本格式读取电子邮件 * 将“Internet"和本地内联网安全区域设置为“高”以在这些区域中禁用ActiveX控件和 Active脚本。 * 配置IE,在运行Active脚本之前提示或在互联网和内网安全区域中禁用Active脚本 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS11-018)以及相应补丁: MS11-018:Cumulative Security Update for Internet Explorer (2497640) 链接:http://www.microsoft.com/technet/security/bulletin/MS11-018.asp |
id | SSV:20478 |
last seen | 2017-11-19 |
modified | 2011-04-15 |
published | 2011-04-15 |
reporter | Root |
title | Microsoft IE布局处理释放后重用远程内存破坏漏洞(MS11-018) |
References
- http://www.securitytracker.com/id?1025327
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=900
- http://www.us-cert.gov/cas/techalerts/TA11-102A.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12463
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-018