Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2010-0249

CVE information

Published

14 years ago

Last Modified

2 months ago

CVSSv2.0 Severity

High

CVSSv3.1 Severity

High

Impact Analysis

Description

Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object, related to incorrectly initialized memory and improper handling of objects in memory, as exploited in the wild in December 2009 and January 2010 during Operation Aurora, aka "HTML Object Memory Corruption Vulnerability.".

CVSSv2.0 Score

Severity
High
Base Score
9.3/10
Exploit Score
8.6/10
Access Vector
Network
Access Complexity
Medium
Authentication Required
None
Impact Score
10/10
Confidentiality Impact
Complete
Availability Impact
Complete
Integrity Impact
Complete

CVSSv3.1 Score

Severity
High
Base Score
8.8/10
Exploit Score
2.8/10
Access Vector
Network
Access Complexity
Low
Privileges Required
None
Impact Score
5.9/10
Confidentiality Impact
High
Availability Impact
High
Integrity Impact
High
Scope
Unchanged
User Interaction
Required

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*
  Yes
-
cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
  No
-
cpe:2.3:a:microsoft:internet_explorer:6:-:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itaniu
  No
-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*
  No
-
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:
  No
-
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
  No
-
cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itaniu
  No
-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*
  No
-
cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*
  No
-
cpe:2.3:o:microsoft:windows_vista:-:*:*:*:-:*:x64:*
  No
-
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:
  No
-
cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium
  No
-
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
  No
-
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*
  No
-
cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*
  No
-
cpe:2.3:o:microsoft:windows_vista:-:*:*:*:-:*:x64:*
  No
-
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:
  No
-
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
  No
-
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
  No
-