Rule

--
Sid
18951

--
Summary:
This event is generated when an attempt is made to exploit a known vulnerability in ie.

--
Impact:
Denial of Service. Information disclosure. Loss of integrity. 

--
Detailed Information:
Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-2530 and CVE-2009-2531.

--
Affected Systems:
microsoft ie 6
microsoft ie 6.0
microsoft ie 6.0.2600
microsoft ie 6.0.2800
microsoft ie 6.0.2800.1106
microsoft ie 6.0.2900
microsoft ie 6.0.2900.2180
microsoft ie 6.00.2462.0000
microsoft ie 6.00.2479.0006
microsoft ie 6.00.2600.0000
microsoft ie 6.00.2800.1106
microsoft ie 6.00.2900.2180
microsoft ie 6.00.3663.0000
microsoft ie 6.00.3718.0000
microsoft ie 6.00.3790.0000
microsoft ie 6.00.3790.1830
microsoft ie 6.00.3790.3959
microsoft ie 7
microsoft ie 7.0
microsoft ie 7.0.5730
microsoft ie 7.0.5730
microsoft ie 7.0.5730.11
microsoft ie 7.00.5730.1100
microsoft ie 7.00.6000.16386
microsoft ie 7.00.6000.16441
microsoft ie 8
microsoft ie 8.0.6001

--
Attack Scenarios:
In an SQL injection attack, the attacker is able to coerce the application into running SQL queries of the attackers choosing. This can lead to a complete compromise of the data stored in the system as well as the attacker being able to gain administrative access to the application.

--
Ease of Attack:
Simple. Exploits exist.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

--
Contributors:
Sourcefire Vulnerability Research Team
This document was generated from data supplied by the National Vulnerability Database. A product of the National Institute of Standards and Technology.
For more information see http://nvd.nist.gov/

--
Additional References:

NIST CVE-2010-0244:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0244
 
Common Weakness Enumeration:
http://cwe.mitre.org/data/definitions/89.html
 
Common Attack Pattern Enumeration and Classification:
http://capec.mitre.org/data/definitions/66.html

--
