Summary
A use-after-free in Internet Explorer's HTML object handling lets a remote attacker run code when a victim opens a crafted webpage. The flaw was exploited in the wild as part of Operation Aurora and required no authentication, but it did require user interaction. Successful exploitation executes code as the logged-on user, which can lead to full compromise if that user has administrative rights.
Why Planned Fix?
5/6Exploitation Details
Execute arbitrary code as the logged-on user
RCE (Remote Code Execution)Affected Software
| Product | Affected Versions |
|---|---|
| Internet Explorer | 6, 6 SP1, 7, and 8 |
Microsoft web browser for viewing websites and web-based content on Windows.
Affected ComponentHTML object handling in the browser's mshtml/Trident engine.
HTML object handling in the browser's mshtml/Trident engine.
Enable DEP on IE6/IE7 and use Microsoft mitigations such as setting the Internet zone to High or disabling Active Scripting to reduce exposure until patched.
Enable DEP on IE6/IE7 and use Microsoft mitigations such as setting the Internet zone to High or disabling Active Scripting to reduce exposure until patched.
Not available
Apply Microsoft Security Bulletin MS10-002 / KB978207 for the affected Internet Explorer releases.
Apply Microsoft Security Bulletin MS10-002 / KB978207 for the affected Internet Explorer releases.
Probability of exploitation in the next 30 days
Worse than 100% of all CVEs
No known threat actors
NVD Data
Description Summary
CVSS Base Score
CVSS Vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
Affected Software (CPE) (5)
- •cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:internet_explorer:6:-:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
Sources
| Source | Article |
|---|---|
| learn.microsoft.com | Microsoft Security Bulletin MS10-002 |
| learn.microsoft.com | Microsoft Security Advisory 979352 |
| nvd.nist.gov | CVE-2010-0249 Detail |
| kb.cert.org | VU#492515 Microsoft Internet Explorer HTML object memory corruption vulnerability |
| www.tenable.com | CVE-2010-0249 Plugins |
| www.snort.org | Snort Rule Document 1:37947 |
| www.juniper.net | HTTP: Microsoft Internet Explorer Use-After-Free Remote Code Execution (CVE-2010-0249) |
| github.com | ms10_002_aurora.rb |
| www.exploit-db.com | Microsoft Internet Explorer 6 - 'Aurora' Memory Corruption (MS10-002) |
Priority History
Initial analysis