(MS10-002) HTML Object Memory Corruption Vulnerability
Publish Date: 04 février 2011
Gravité: : Critique
Identifiant(s) CVE: : CVE-2010-0248
Date du conseil: 04 février 2011
Description
Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."
Information Exposure Rating:
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Affected software and version:
- Microsoft IE 6
- Microsoft IE 6.0
- Microsoft IE 6.0.2600
- Microsoft IE 6.0.2800
- Microsoft IE 6.0.2800.1106
- Microsoft IE 6.0.2900
- Microsoft IE 6.0.2900.2180
- Microsoft IE 6.00.2462.0000
- Microsoft IE 6.00.2479.0006
- Microsoft IE 6.00.2600.0000
- Microsoft IE 6.00.2800.1106
- Microsoft IE 6.00.2900.2180
- Microsoft IE 6.00.3663.0000
- Microsoft IE 6.00.3718.0000
- Microsoft IE 6.00.3790.0000
- Microsoft IE 6.00.3790.1830
- Microsoft IE 6.00.3790.3959
- Microsoft IE 7
- Microsoft IE 7.0
- Microsoft IE 7.0.5730
- Microsoft IE 7.0.5730.11
- Microsoft IE 7.00.5730.1100
- Microsoft IE 7.00.6000.16386
- Microsoft IE 7.00.6000.16441
- Microsoft IE 8
- Microsoft IE 8.0.6001