Summary
A use-after-free in Internet Explorer's Peer Objects component (iepeers.dll) causes memory corruption when the browser processes specially crafted web content. A remote attacker can host or inject a malicious page and lure a user to visit it; no authentication is required. Successful exploitation runs code as the logged-on user and can fully compromise the machine if that user has administrative rights.
Why Fix Soon?
5/6Exploitation Details
Execute arbitrary code in the logged-on user's context; if the user is an administrator, gain full control of the system.
RCE (Remote Code Execution)Affected Software
| Product | Affected Versions |
|---|---|
| Internet Explorer | 6 Service Pack 1, 6, and 7 |
Microsoft web browser used to access websites and render HTML content, including web content embedded in email and Office-style applications.
Affected ComponentPeer Objects component (iepeers.dll) in Internet Explorer, used in the DHTML behaviors / Web Folders printing path.
Peer Objects component (iepeers.dll) in Internet Explorer, used in the DHTML behaviors / Web Folders printing path.
As a temporary mitigation, disable the peer factory class in iepeers.dll by removing its CLSID registry key; Microsoft also documents restricting ACLs on iepeers.dll, enabling DEP in IE7, and raising IE security zones to High.
As a temporary mitigation, disable the peer factory class in iepeers.dll by removing its CLSID registry key; Microsoft also documents restricting ACLs on iepeers.dll, enabling DEP in IE7, and raising IE security zones to High.
Not available
Install Microsoft's MS10-018 cumulative Internet Explorer security update that fixes CVE-2010-0806 on affected systems.
Install Microsoft's MS10-018 cumulative Internet Explorer security update that fixes CVE-2010-0806 on affected systems.
Probability of exploitation in the next 30 days
Worse than 100% of all CVEs
No known threat actors
No detection rules available
NVD Data
Description Summary
CVSS Base Score
CVSS Vector (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Affected Software (CPE) (19)
- •cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
- •cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
- •cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
Sources
| Source | Article |
|---|---|
| learn.microsoft.com | Microsoft Security Advisory 981374 |
| learn.microsoft.com | Microsoft Security Bulletin MS10-018 - Critical |
| nvd.nist.gov | CVE-2010-0806 Detail |
| kb.cert.org | VU#744549 - Microsoft Internet Explorer iepeers.dll use-after-free vulnerability |
| microsoft.com | Exploit:JS/CVE-2010-0806 threat description |
| zscaler.com | Spike Of "iepeers.dll" Exploits |
| cisa.gov | Known Exploited Vulnerabilities Catalog |
| rapid7.com | MS10-018 Microsoft Internet Explorer DHTML Behaviors Use After Free |
Priority History
Initial analysis