search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Microsoft Internet Explorer HTML object memory corruption vulnerability

Vulnerability Note VU#492515

Original Release Date: 2010-01-14 | Last Revised: 2010-01-21

Overview

An invalid pointer reference within Microsoft Internet Explorer may lead to execution of arbitrary code.

Description

Microsoft Internet Explorer contains a memory corruption vulnerability, which can result in an invalid pointer being accessed after an object is incorrectly initialized or has been deleted. In certain circumstances, the invalid pointer access can be leveraged by an attacker to execute arbitrary code. This vulnerability is being actively exploited, and exploit code is publically available.

Please see Microsoft Security Advisory 979352 for further information.

Impact

By convincing a user to load a specially crafted HTML document or Microsoft Office document, a remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition.

Solution

Apply an update
Microsoft has released an update to address the issue. See Microsoft Security Bulletin MS10-002 for more information. Users are encouraged to consider additional mitigations listed in Microsoft Security Advisory 979352:

Enable Data Execution Prevention (DEP) on Internet Explorer 6 or Internet Explorer 7


Microsoft has published more information on DEP as a mitigation for this vulnerability. DEP should not be treated as a complete workaround, but DEP can mitigate the execution of attacker-supplied code in some cases. Microsoft has published detailed technical information about DEP in Security Research & Defense blog posts "Understanding DEP as a mitigation technology" part 1 and part 2. Use of DEP should be considered in conjunction with other mitigations described in this document.

Set the Internet zone security setting to "High"

Setting the Internet zone security setting to "High" will result in the user being prompted before running ActiveX controls and Active Scripting, which may reduce the risk of certain attack vectors.

Disable Active Scripting

Disabling Active Scripting will prevent Active Scripting from running, which may reduce the risk of certain attack vectors.

Disable ActiveX Controls in Microsoft Office

This vulnerability can be exploited through a Microsoft Office document containing an ActiveX control. Disabling ActiveX controls in Microsoft Office blocks this attack vector. For detailed instructions on how to disable ActiveX in Microsoft Office, see the "Workarounds" section of Microsoft Security Advisory 979352 and the "Enable or disable ActiveX controls in Office documents" Microsoft Office Online article.

Vendor Information

492515
 
Affected   Unknown   Unaffected

Microsoft Corporation

Updated:  January 14, 2010

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see Microsoft Security Advisory 979352 for more information

Vendor References


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

This vulnerability was reported by Microsoft. Microsoft credits Google Inc., MANDIANT, Adobe, and McAfee.

This document was written by David Warren.

Other Information

CVE IDs: CVE-2010-0249
Severity Metric: 41.04
Date Public: 2010-01-14
Date First Published: 2010-01-14
Date Last Updated: 2010-01-21 21:14 UTC
Document Revision: 63

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.