Vulnerability Details : CVE-2010-0249
Public exploit exists!
Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object, related to incorrectly initialized memory and improper handling of objects in memory, as exploited in the wild in December 2009 and January 2010 during Operation Aurora, aka "HTML Object Memory Corruption Vulnerability."
Vulnerability category: Memory CorruptionExecute code
Exploit prediction scoring system (EPSS) score for CVE-2010-0249
Probability of exploitation activity in the next 30 days: 96.33%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2010-0249
-
MS10-002 Microsoft Internet Explorer "Aurora" Memory Corruption
Disclosure Date: 2010-01-14First seen: 2020-04-26exploit/windows/browser/ms10_002_auroraThis module exploits a memory corruption flaw in Internet Explorer. This flaw was found in the wild and was a key component of the "Operation Aurora" attacks that lead to the compromise of a number of high profile companies. The exploit code is a direct port of the
CVSS scores for CVE-2010-0249
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2010-0249
-
Assigned by: nvd@nist.gov (Primary)
-
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-0249
-
http://support.microsoft.com/kb/979352
Microsoft Security Advisory: Vulnerability in Internet Explorer could allow remote code executionPatch;Vendor Advisory
-
http://blogs.technet.com/msrc/archive/2010/01/14/security-advisory-979352.aspx
Page not found – Microsoft Security Response CenterBroken Link;Vendor Advisory
-
http://osvdb.org/61697
Broken Link
-
http://www.kb.cert.org/vuls/id/492515
VU#492515 - Microsoft Internet Explorer HTML object memory corruption vulnerabilityThird Party Advisory;US Government Resource
-
http://securitytracker.com/id?1023462
Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/37815
Internet Explorer CVE-2010-0249 'srcElement()' Remote Code Execution VulnerabilityBroken Link;Exploit;Third Party Advisory;VDB Entry
-
http://www.exploit-db.com/exploits/11167
Microsoft Internet Explorer 6 - 'Aurora' Memory Corruption (MS10-002) - Windows remote ExploitExploit;Third Party Advisory;VDB Entry
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/55642
Microsoft Internet Explorer freed object code execution CVE-2010-0249 Vulnerability ReportThird Party Advisory;VDB Entry
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002
Microsoft Security Bulletin MS10-002 - Critical | Microsoft DocsPatch;Vendor Advisory
-
http://www.vupen.com/english/advisories/2010/0135
Webmail | OVH- OVHBroken Link
-
http://www.us-cert.gov/cas/techalerts/TA10-055A.html
Alerts | CISABroken Link;Third Party Advisory;US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6835
Repository / Oval RepositoryBroken Link
-
http://news.cnet.com/8301-27080_3-10435232-245.html
Page Not Found (404) - CNETBroken Link
-
http://www.microsoft.com/technet/security/advisory/979352.mspx
Technical documentation, API, and code examples | Microsoft DocsBroken Link;Patch;Vendor Advisory
Products affected by CVE-2010-0249
- cpe:2.3:a:microsoft:internet_explorer:6:-:*:*:*:*:*:*When used together with: Microsoft » Windows Xp » Version: N/A Update SP2 Professional Edition For X64
- cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*When used together with: Microsoft » Windows Xp » Version: N/A Update SP2 Professional Edition For X64
- cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*When used together with: Microsoft » Windows Xp » Version: N/A Update SP2 Professional Edition For X64