Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Extremely critical

Internet Explorer Multiple Vulnerabilities

-

Release Date:  2010-03-09    Last Update:  2010-04-07    Views:  41,824

Secunia Advisory SA38860

Where:

From remote

Impact:

Exposure of sensitive information, System access

Solution Status:

Vendor Patch

CVE Reference(s):

Description


Multiple vulnerabilities have been reported in Internet Explorer, which can be exploited by malicious people to gain knowledge of sensitive information or compromise a user's system.

1) An error when firing events while at the same time manipulating elements in the markup can be exploited to corrupt memory.

2) An error in the handling of content using specific encoding strings when submitting data can be exploited to gain knowledge of sensitive information when a user e.g. views a specially crafted web page.

3) A race condition when accessing objects can be exploited to corrupt memory.

4) An error when attempting to access objects that have not been initialised or have been deleted may result in uninitialised memory being used.

5) A use-after-free error in the handling of an HTML object with the "onreadystatechange" event handler can be exploited to corrupt memory.

6) A use-after-free error in mstime.dll when handling the "TIME2" behaviour may be exploited to execute arbitrary code.

7) An error may allow script code to gain access to a browser window in another domain or Internet Explorer zone if a user is tricked into dragging the browser window across a second browser window.

8) An array-indexing error within the Microsoft Tabular Data Control ActiveX control (tdc.ocx) when the "CTDCCtl::SecurityCheckDataURL()" function parses "DataURL" parameter values can be exploited to write a single NULL-byte to an arbitrary memory location.

9) A use-after-free error in iepeers.dll when handling invalid values passed to the "setAttribute()" function can be exploited to dereference invalid memory when a specially crafted web page using the "#default#userData" behavior is accessed.

NOTE: The vulnerability is currently being actively exploited.

10) An error in the HTML rendering can be exploited to corrupt memory via a specially crafted web page.


Solution:
Apply patches.

Further details available to Secunia VIM customers

Provided and/or discovered by:
1) Originally reported as a DoS by dwt. Additional research performed by Secunia Research.
2) The vendor credits Daiki Fukumori, Cyber Defense Institute Inc.
3) Reported by the vendor.
4) The vendor credits Ivan Fratric, iSIGHT Partners Global Vulnerability Partnership and Alexander Kornbrust, Red Database Security.
5) wushi of team509, reported via iDefense.
6) Simon Zuckerbraun, reported via ZDI.
7) The vendor credits Paul Stone, Context Information Security.
8) An anonymous person, reported via ZDI.
9) Reported as a 0-day. The vendor also credits ADLab, VenusTech.
10) The vendor credits ADLab, VenusTech.

Original Advisory:
MS10-018 (KB980182):
http://www.microsoft.com/technet/security/bulletin/ms10-018.mspx

Microsoft:
http://www.microsoft.com/technet/security/advisory/981374.mspx

iDefense Labs:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=864

ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-10-033/
http://www.zerodayinitiative.com/advisories/ZDI-10-034/

JVN:
http://jvn.jp/jp/JVN49467403/index.html

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Internet Explorer Multiple Vulnerabilities

User Message
blog.psi2.de RE: Internet Explorer Unspecified Code Execution Vulnerability
Member 9th Mar, 2010 21:38
Score: 5
Posts: 4
User Since: 6th Mar 2010
System Score: N/A
Location: DE
Last edited on 9th Mar, 2010 21:38
"Solution: Do not visit untrusted sites."

Take a look at the "Workarounds"-Section of the Microsoft-Advisory:
http://www.microsoft.com/technet/security/advisory...

--
Visit my Security-Blog:
http://blog.psi2.de/en (English) or
http://blog.psi2.de (German)
Was this reply relevant?
+2
-0
randomu RE: Internet Explorer Unspecified Code Execution Vulnerability
Member 10th Mar, 2010 04:16
Score: 2
Posts: 1
User Since: 10th Mar 2010
System Score: N/A
Location: BR
Last edited on 10th Mar, 2010 04:16
You should add "Update to version 8" as a solution, since the vulnerability doesn't affect IE 8...

(also, in Google Chrome reports from version 3 you add the Update to version 4 solution... what's happening here, why you treat them differently?)
Was this reply relevant?
+2
-0

chickwich

RE: Internet Explorer Unspecified Code Execution Vulnerability
[+]
This reply has been minimised due to a negative Relevancy Score.

wr

RE: Internet Explorer Unspecified Code Execution Vulnerability
[+]
This reply has been minimised due to a negative Relevancy Score.

Jesant13

RE: Internet Explorer iepeers.dll Use-After-Free Vulnerability
[+]
This reply has been minimised due to a negative Relevancy Score.
Jesant13 RE: Internet Explorer iepeers.dll Use-After-Free Vulnerability
Member 19th Mar, 2010 15:29
Score: -3
Posts: 40
User Since: 10th Sep 2009
System Score: 100%
Location: US
Last edited on 19th Mar, 2010 15:29
Microsoft needs to release a patch to fix this vulnerability. I'm using IE 7 & I cannot upgrade because I'm on a school computer which has limited permissions.

I also apologize for my previous post - it was off-topic.
Was this reply relevant?
+1
-0

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability