{"vuid":"VU#899748","idnumber":"899748","name":"Microsoft Internet Explorer invalid flag reference vulnerability","keywords":["Microsoft","Internet Explorer","invalid flag reference","remote code execution","2458511"],"overview":"Microsoft Internet Explorer invalid flag reference vulnerability","clean_desc":"According to the Microsoft Security Research & Defense Blog, Microsoft Internet Explorer incorrectly under-allocates memory to store a certain combination of Cascading Style Sheets (CSS) tags when parsing HTML, resulting in an overwrite of the least significant byte of a vtable pointer. The Microsoft Security Advisory (2458511) refers to the vulnerability as an invalid flag reference vulnerability, where the reference to an object can be accessed after it is deleted. Exploit code for this vulnerability is publicly available.","impact":"By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user.","resolution":"Apply an update This issue is addressed in Microsoft Security Bulletin MS10-090.","workarounds":"Workarounds Microsoft has listed several workarounds in Microsoft Security Advisory (2458511).","sysaffected":"","thanks":"Thanks to Microsoft Security Response Center for reporting this vulnerability, who in turn credit Symantec.","author":"This document was written by Michael Orlando.","public":["http://www.microsoft.com/technet/security/advisory/2458511.mspx","http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3962","http://support.microsoft.com/kb/2458511","http://blogs.technet.com/b/srd/archive/2010/11/03/dep-emet-protect-against-attacks-on-the-latest-internet-explorer-vulnerability.aspx","http://www.exploit-db.com/exploits/15421/","http://www.microsoft.com/technet/security/bulletin/MS10-090.mspx"],"cveids":["CVE-2010-3962"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2010-11-03T15:11:53Z","publicdate":"2010-11-03T00:00:00Z","datefirstpublished":"2010-11-03T20:22:01Z","dateupdated":"2014-03-11T18:24:17Z","revision":31,"vrda_d1_directreport":"1","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"16","cam_population":"17","cam_impact":"14","cam_easeofexploitation":"20","cam_attackeraccessrequired":"17","cam_scorecurrent":"54.621","cam_scorecurrentwidelyknown":"54.621","cam_scorecurrentwidelyknownexploited":"84.966","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":54.621,"vulnote":null}