Vulnerability Name:

CVE-2010-3962 (CCN-62962)

Assigned:2010-11-03
Published:2010-11-03
Updated:2022-02-28
Summary:Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue or "Uninitialized Memory Corruption Vulnerability," as exploited in the wild in November 2010.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-416
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: Vendor Advisory
http://blogs.technet.com/b/msrc/archive/2010/11/02/microsoft-releases-security-advisory-2458511.aspx

Source: CCN
Type: Microsoft TechNet Blog
DEP, EMET protect against attacks on the latest Internet Explorer vulnerability

Source: MITRE
Type: CNA
CVE-2010-3962

Source: CCN
Type: SA42091
Internet Explorer CSS Tag Parsing Code Execution Vulnerability

Source: SECUNIA
Type: Broken Link, Vendor Advisory
42091

Source: CCN
Type: SECTRACK ID: 1024676
Microsoft Internet Explorer Freed Object Invalid Flag Reference Access Lets Remote Users Execute Arbitrary Code

Source: CCN
Type: Microsoft Security Bulletin MS11-099
Cumulative Security Update for Internet Explorer (2618444)

Source: CCN
Type: Microsoft Security Bulletin MS12-010
Cumulative Security Update for Internet Explorer (2647516)

Source: CCN
Type: Microsoft Security Bulletin MS12-023
Cumulative Security Update for Internet Explorer (2675157)

Source: CCN
Type: Microsoft Security Bulletin MS12-037
Cumulative Security Update for Internet Explorer (2699988)

Source: CCN
Type: Microsoft Security Bulletin MS12-044
Cumulative Security Update for Internet Explorer (2719177)

Source: CCN
Type: Microsoft Security Bulletin MS12-052
Cumulative Security Update for Internet Explorer (2722913)

Source: EXPLOIT-DB
Type: Third Party Advisory, VDB Entry
15418

Source: EXPLOIT-DB
Type: Third Party Advisory, VDB Entry
15421

Source: CCN
Type: IBM Security Solutions Protection Alert
Microsoft Internet Explorer Could Allow Remote Code Execution

Source: CCN
Type: US-CERT VU#899748
Microsoft Internet Explorer invalid flag reference vulnerability

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#899748

Source: CCN
Type: Microsoft Security Advisory (2458511)
Vulnerability in Internet Explorer Could Allow Remote Code Execution

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.microsoft.com/technet/security/advisory/2458511.mspx

Source: CCN
Type: Microsoft Security Bulletin MS10-090
Cumulative Security Update for Internet Explorer (2416400)

Source: CCN
Type: Microsoft Security Bulletin MS11-003
Cumulative Security Update for Internet Explorer (2482017)

Source: CCN
Type: Microsoft Security Bulletin MS11-018
Cumulative Security Update for Internet Explorer (2497640)

Source: CCN
Type: Microsoft Security Bulletin MS11-050
Cumulative Security Update for Internet Explorer (2530548)

Source: CCN
Type: Microsoft Security Bulletin MS11-057
Cumulative Security Update for Internet Explorer (2559049)

Source: CCN
Type: Microsoft Security Bulletin MS11-081
Cumulative Security Update for Internet Explorer (2586448)

Source: BID
Type: Broken Link, Third Party Advisory, VDB Entry
44536

Source: CCN
Type: BID-44536
Microsoft Internet Explorer CSS Tags Uninitialized Memory Remote Code Execution Vulnerability

Source: SECTRACK
Type: Broken Link, Third Party Advisory, VDB Entry
1024676

Source: MISC
Type: Not Applicable
http://www.symantec.com/connect/blogs/new-ie-0-day-used-targeted-attacks

Source: CERT
Type: Third Party Advisory, US Government Resource
TA10-348A

Source: VUPEN
Type: Broken Link, Vendor Advisory
ADV-2010-2880

Source: MS
Type: Patch, Vendor Advisory
MS10-090

Source: XF
Type: Third Party Advisory, VDB Entry
ms-ie-flag-code-execution(62962)

Source: XF
Type: UNKNOWN
ms-ie-flag-code-execution(62962)

Source: OVAL
Type: Tool Signature
oval:org.mitre.oval:def:12279

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [11-04-2010]

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [01-20-2011]

Vulnerable Configuration:Configuration 1:
  • cpe:/a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*
  • OR cpe:/o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
  • OR cpe:/o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
  • AND
  • cpe:/o:microsoft:windows_7:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
  • OR cpe:/o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:ie:8.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:12279
    V
    Uninitialized Memory Corruption Vulnerability
    2014-08-18
    BACK
    microsoft internet explorer 6
    microsoft windows server 2003 - sp2
    microsoft windows xp - sp2
    microsoft windows xp - sp3
    microsoft internet explorer 7
    microsoft windows server 2003 - sp2
    microsoft windows server 2008 - -
    microsoft windows server 2008 - sp2
    microsoft windows vista - sp1
    microsoft windows vista - sp2
    microsoft windows xp - sp2
    microsoft windows xp - sp3
    microsoft internet explorer 8
    microsoft windows 7 -
    microsoft windows server 2003 - sp2
    microsoft windows server 2008 - -
    microsoft windows server 2008 - sp2
    microsoft windows server 2008 r2
    microsoft windows vista - sp1
    microsoft windows vista - sp2
    microsoft windows xp - sp2
    microsoft windows xp - sp3
    microsoft ie 6.0
    microsoft ie 7.0
    microsoft ie 8.0