{"vuid":"VU#744549","idnumber":"744549","name":"Microsoft Internet Explorer iepeers.dll use-after-free vulnerability","keywords":["Microsoft","MS","Internet Explorer","IE 6","IE 7","remote code execution","zero day","0-day","981374","invalid pointer","userdata"],"overview":"Microsoft Internet Explorer contains a use-after-free vulnerability in the iepeers.dll file, which may allow a remote, unauthenticated attacker to execute arbitrary code.","clean_desc":"Microsoft Internet Explorer provides support for Web Folders and printing through the use of the iepeers.dll component. According to Microsoft Security Advisory (981374), the iepeers.dll contains a vulnerability in the use of a pointer after an object is freed. Microsoft reports that the vulnerability, which affects Internet Explorer 6 and 7,  has been reported publicly. Exploit code for this vulnerability is publicly available. This vulnerability is currently being exploited in the wild.","impact":"By convincing a user to load a specially crafted HTML document or Microsoft Office document, a remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition.","resolution":"Apply an update\nThis issue is addressed in Microsoft Security Bulletin MS10-018, which modifies the way Internet Explorer handles objects in memory.","workarounds":"Enable Data Execution Prevention (DEP) on Internet Explorer 6 or Internet Explorer 7 Microsoft has published more information on DEP as a mitigation for this vulnerability. DEP should not be treated as a complete workaround, but DEP can mitigate the execution of attacker-supplied code in some cases. Microsoft has published detailed technical information about DEP in Security Research & Defense blog posts \"Understanding DEP as a mitigation technology\" part 1 and part 2. Use of DEP should be considered in conjunction with other mitigations described in this document. Set the Internet zone security setting to \"High\" Setting the Internet zone security setting to \"High\" will result in the user being prompted before running ActiveX controls and Active Scripting, which may reduce the risk of certain attack vectors. Disable Active Scripting Disabling Active Scripting will prevent Active Scripting from running, which may reduce the risk of certain attack vectors.","sysaffected":"","thanks":"Thanks to Microsoft  for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["http://www.microsoft.com/technet/security/bulletin/ms10-018.mspx","http://www.microsoft.com/technet/security/advisory/981374.mspx","http://support.microsoft.com/kb/927917"],"cveids":["CVE-2010-0806"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2010-03-09T18:50:34Z","publicdate":"2010-03-09T00:00:00Z","datefirstpublished":"2010-03-09T19:12:53Z","dateupdated":"2010-03-30T21:56:27Z","revision":18,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"20","cam_exploitation":"17","cam_internetinfrastructure":"10","cam_population":"20","cam_impact":"15","cam_easeofexploitation":"6","cam_attackeraccessrequired":"18","cam_scorecurrent":"28.5525","cam_scorecurrentwidelyknown":"28.5525","cam_scorecurrentwidelyknownexploited":"30.375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":28.5525,"vulnote":null}