Advisory Details

April 2nd, 2010

Microsoft Internet Explorer TIME2 Behavior Remote Code Execution Vulnerability

ZDI-10-033
ZDI-CAN-548

CVE ID CVE-2010-0492
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Internet Explorer
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['9632']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page.

The issue is located within the CTimeAction object. During handling of the TIME2 behavior, an attacker can trick the application into destroying the markup causing the application to reference memory that has previously been freed. Successful exploitation can lead to code execution under the context of the application.

ADDITIONAL DETAILS Microsoft has issued an update to correct this vulnerability. More details can be found at:
http://www.microsoft.com/technet/security/bulletin/ms10-018.mspx
DISCLOSURE TIMELINE
  • 2009-08-10 - Vulnerability reported to vendor
  • 2010-04-02 - Coordinated public release of advisory
CREDIT Simon Zuckerbraun
BACK TO ADVISORIES