English | Deutsch | Espa├▒ol | Portugu├¬s
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 95248 CVE descriptions
and 52540 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.902325
Category:General
Title:Microsoft Internet Explorer 'CSS Import Rule' Use-after-free Vulnerability
Summary:Check for the vulnerable version of mshtml.dll file version
Description:Description:

Overview: This host has installed with Internet Explorer and is prone to
Use-after-free Vulnerability.

Vulnerability Insight:
The flaw is due to use-after-free error within the 'mshtml.dll' library
when processing a web page referencing a 'CSS' file that includes various
'@import' rules.

Impact:
Successful exploitation will allow attackers to execute arbitrary code in the
context of the application. Failed exploit attempts will result in
denial-of-service conditions.

Impact Level: System/Application

Affected Software/OS:
Microsoft Internet Explorer version 6.x/7.x/8.x

Fix: No solution or patch is available as of 29th Decenber, 2010. Information
regarding this issue will be updated once the solution details are available.
For updates refer to http://www.microsoft.com/windows/internet-explorer/default.aspx

References:
http://secunia.com/advisories/42510
http://www.vupen.com/english/advisories/2010/3156
http://www.microsoft.com/technet/security/advisory/2488013.mspx

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: BugTraq ID: 45246
Common Vulnerability Exposure (CVE) ID: CVE-2010-3971
http://www.exploit-db.com/exploits/15708
http://www.exploit-db.com/exploits/15746
http://seclists.org/fulldisclosure/2010/Dec/110
http://www.breakingpointsystems.com/community/blog/ie-vulnerability/
http://www.wooyun.org/bugs/wooyun-2010-0885
http://www.microsoft.com/technet/security/advisory/2488013.mspx
http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx
Microsoft Security Bulletin: MS11-003
http://www.microsoft.com/technet/security/Bulletin/MS11-003.mspx
CERT/CC vulnerability note: VU#634956
http://www.kb.cert.org/vuls/id/634956
http://www.securityfocus.com/bid/45246
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12382
http://www.securitytracker.com/id?1024922
http://secunia.com/advisories/42510
http://www.vupen.com/english/advisories/2010/3156
http://www.vupen.com/english/advisories/2011/0318
CopyrightCopyright (C) 2010 SecPod

This is only one of 52540 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2016 E-Soft Inc. All rights reserved.