CERT-In Vulnerability Note
CIVN-2009-0142
Microsoft Internet Explorer Cascading Style Sheets Remote Code Execution Vulnerability
Original Issue Date:November 23, 2009
Updated: May 28, 2010
Severity Rating: HIGH
Systems Affected
- Windows XP SP 2 , SP 3
- Windows XP Professional x64 Edition SP 2
- Windows Server 2003 SP 2
- Windows Server 2003 x64 Edition SP 2
- Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista
- Windows Vista SP 1 and SP 2
- Windows Vista x64 Edition
- Windows Vista x64 Edition SP 1 and SP 2
- Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems SP 2
- Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems SP 2
- Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems SP 2
- Internet Explorer 6 SP 1 on Microsoft Windows 2000 SP 4
- Internet Explorer 6 for Windows XP SP 2, Windows XP SP 3, and Windows XP Professional x64 Edition SP 2
- Internet Explorer 6 for Windows Server 2003 SP 2, Windows Server 2003 with SP2 for Itanium-based Systems, and Windows Server 2003 x64 Edition SP 2
- Internet Explorer 7 for Windows XP SP 2 and Windows XP SP 3, and Windows XP Professional x64 Edition SP 2
- Internet Explorer 7 for Windows Server 2003 SP 2, Windows Server 2003 with SP2 for Itanium-based Systems, and Windows Server 2003 x64 Edition SP 2
- Internet Explorer 7 in Windows Vista, Windows Vista SP 1 and Windows Vista SP 2, and Windows Vista x64 Edition, Windows Vista x64 Edition SP 1, and Windows Vista x64 Edition SP 2
- Internet Explorer 7 in Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems SP 2
- Internet Explorer 7 in Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems SP 2
- Internet Explorer 7 in Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems SP 2
Overview
A zero day vulnerability has been reported in Microsoft Internet Explorer, which could be exploited by remote attackers to cause denial of service condition or execute arbitrary code by persuading a user to visit a specially crafted CSS page.
Description
The vulnerability is due to a dangling pointer in Microsoft HTML Viewers mshtml.dll file when it attempts to retrieve certain Cascading Style Sheet CSS objects using the etElementsByTagName function.
The processing of malicious data could crash the browser or to execute arbitrary code with the privileges of the user.
Workaround
- Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting in these zones.
- Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone
- Enable Data Execution Prevention in Internet Explorer
- Do not follow unsolicited links.
For detailed steps and impact of applying these workarounds refer to to Microsoft Security Bulletin MS09-072
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS09-072
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms09-072.mspx 20
http://www.microsoft.com/technet/security/advisory/977981.mspx
References
Microsoft
http://www.microsoft.com/technet/security/bulletin/ms09-072.mspx 20
http://www.microsoft.com/technet/security/advisory/977981.mspx
Securityfocus
http://www.securityfocus.com/bid/37085
Secunia
http://secunia.com/advisories/37448/
VUPEN
http://www.vupen.com/english/advisories/2009/3301
SecurityTracker
http://securitytracker.com/alerts/2009/Nov/1023226.html
ISS X-FORCE
http://xforce.iss.net/xforce/xfdb/54367
CVE Name
CVE-2009-3672
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|