CERT-In Vulnerability Note
CIVN-2010-0271
Internet Explorer CSS Import Rule Processing Use-After-Free remote code execution Vulnerability
Original Issue Date:December 23, 2010
Severity Rating: HIGH
Systems Affected
- Windows XP SP3
- Windows XP Professional x64 Edition SP2
- Windows Server 2003 SP2
- Windows Server 2003 x64 Edition SP
- Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista SP1 and Windows Vista SP2
- Windows Vista x64 Edition SP1 & SP2
- Windows Server 2008 for 32-bit Systems and & SP2
- Windows Server 2008 for x64-based Systems & SP2
- Windows Server 2008 for Itanium-based Systems &SP2
- Windows 7 for 32-bit Systems
- Windows 7 for x64-based Systems
- Windows Server 2008 R2 for x64-based Systems
- Windows Server 2008 R2 for Itanium-based Systems
Component Affected
- Internet Explorer 6
- Internet Explorer 7
- Internet Explorer 8
Overview
A use- after- free vulnerability has been reported in Microsoft Internet Explorer which could allow a remote attacker to execute an arbitrary code.
Description
The vulnerability exists in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll. An attacker can exploit this vulnerability by tricking a user to load a HTML page with multiple @import calls(recursive) in the crafted HTML document which leads to remote code execution in the context of the logged-in user.
Note: Proof of concept is publically available.
Workaround
&
nbsp;for EMET <
LI>Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones
Add sites that you trust to the Internet Explorer Trusted sites zone.Do not visit untrusted websites.
Note: For detailed steps and impact of applying these workarounds refer Microsoft security Advisory
(2488013)
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/advisory/2488013.mspx
References
Microsoft
http://www.microsoft.com/technet/security/advisory/2488013.mspx
http://support.microsoft.com/kb/2458544
WooYun.org
http://www.wooyun.org/bugs/wooyun-2010-0885
VUPEN
http://www.vupen.com/english/advisories/2010/3156
CVE Name
CVE-2010-3971
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|