Anfälligkeitssuche        Suche in 187964 CVE Beschreibungen
und 85075 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.801830
Kategorie:Windows
Titel:Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
Zusammenfassung:This host is installed with Internet Explorer and is prone to; remote code execution vulnerability.;; This NVT has been replaced by OID:1.3.6.1.4.1.25623.1.0.900278.
Beschreibung:Summary:
This host is installed with Internet Explorer and is prone to
remote code execution vulnerability.

This NVT has been replaced by OID:1.3.6.1.4.1.25623.1.0.900278.

Vulnerability Insight:
The flaw is caused by a use-after-free error within the 'mshtml.dll' library
when handling circular references between JScript objects and Document Object
Model (DOM) objects, which could allow remote attackers to execute arbitrary
code via a specially crafted web page.

Vulnerability Impact:
Successful exploits allows an attacker to run arbitrary code in the
context of the user running the application. Failed attacks will cause
denial-of-service condition.

Affected Software/OS:
Microsoft Internet Explorer version 8.0.7600.16385.

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: BugTraq ID: 45639
Common Vulnerability Exposure (CVE) ID: CVE-2011-0346
http://www.securityfocus.com/bid/45639
Bugtraq: 20110101 Announcing cross_fuzz, a potential 0-day in circulation, and more (Google Search)
http://www.securityfocus.com/archive/1/515506/100/0/threaded
Cert/CC Advisory: TA11-102A
http://www.us-cert.gov/cas/techalerts/TA11-102A.html
CERT/CC vulnerability note: VU#427980
http://www.kb.cert.org/vuls/id/427980
http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0698.html
http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx
http://lcamtuf.blogspot.com/2011/01/announcing-crossfuzz-potential-0-day-in.html
http://lcamtuf.coredump.cx/cross_fuzz/fuzzer_timeline.txt
http://lcamtuf.coredump.cx/cross_fuzz/known_vuln.txt
http://lcamtuf.coredump.cx/cross_fuzz/msie_crash.txt
Microsoft Security Bulletin: MS11-018
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-018
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11882
http://www.securitytracker.com/id?1024940
http://www.vupen.com/english/advisories/2011/0026
XForce ISS Database: ms-ie-releaseinterface-code-execution(64482)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64482
CopyrightCopyright (C) 2011 Greenbone Networks GmbH

Dies ist nur einer von 85075 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.