Vulnerability Note VU#492515

Microsoft Internet Explorer HTML object memory corruption vulnerability

Original Release date: 14 Jan 2010 | Last revised: 21 Jan 2010

Overview

An invalid pointer reference within Microsoft Internet Explorer may lead to execution of arbitrary code.

Description

Microsoft Internet Explorer contains a memory corruption vulnerability, which can result in an invalid pointer being accessed after an object is incorrectly initialized or has been deleted. In certain circumstances, the invalid pointer access can be leveraged by an attacker to execute arbitrary code. This vulnerability is being actively exploited, and exploit code is publically available.

Please see Microsoft Security Advisory 979352 for further information.

Impact

By convincing a user to load a specially crafted HTML document or Microsoft Office document, a remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition.

Solution

Apply an update
Microsoft has released an update to address the issue. See Microsoft Security Bulletin MS10-002 for more information. Users are encouraged to consider additional mitigations listed in Microsoft Security Advisory 979352:

Enable Data Execution Prevention (DEP) on Internet Explorer 6 or Internet Explorer 7


Microsoft has published more information on DEP as a mitigation for this vulnerability. DEP should not be treated as a complete workaround, but DEP can mitigate the execution of attacker-supplied code in some cases. Microsoft has published detailed technical information about DEP in Security Research & Defense blog posts "Understanding DEP as a mitigation technology" part 1 and part 2. Use of DEP should be considered in conjunction with other mitigations described in this document.

Set the Internet zone security setting to "High"

Setting the Internet zone security setting to "High" will result in the user being prompted before running ActiveX controls and Active Scripting, which may reduce the risk of certain attack vectors.

Disable Active Scripting

Disabling Active Scripting will prevent Active Scripting from running, which may reduce the risk of certain attack vectors.

Disable ActiveX Controls in Microsoft Office

This vulnerability can be exploited through a Microsoft Office document containing an ActiveX control. Disabling ActiveX controls in Microsoft Office blocks this attack vector. For detailed instructions on how to disable ActiveX in Microsoft Office, see the "Workarounds" section of Microsoft Security Advisory 979352 and the "Enable or disable ActiveX controls in Office documents" Microsoft Office Online article.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-14 Jan 2010
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported by Microsoft. Microsoft credits Google Inc., MANDIANT, Adobe, and McAfee.

This document was written by David Warren.

Other Information

  • CVE IDs: CVE-2010-0249
  • Date Public: 14 Jan 2010
  • Date First Published: 14 Jan 2010
  • Date Last Updated: 21 Jan 2010
  • Severity Metric: 41.04
  • Document Revision: 63

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.