=====================================================================
                                   CERT-Renater

                        Note d'Information No. 2010/VULN528
_____________________________________________________________________

DATE                      : 15/12/2010

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Windows XP, Windows Vista, Windows 7, Windows Server 2003,
                               Windows Server 2008 running Internet Explorer versions 6, 7, 8.

======================================================================
KB2416400
http://www.microsoft.com/technet/security/bulletin/MS10-090.mspx
______________________________________________________________________

Microsoft Security Bulletin MS10-090 - Critical
Cumulative Security Update for Internet Explorer (2416400)

Version: 1.0

General Information

Executive Summary

  This security update resolves four privately reported vulnerabilities and
  three publicly disclosed vulnerabilities in Internet Explorer. The most
  severe vulnerabilities could allow remote code execution if a user views a
  specially crafted Web page using Internet Explorer. Users whose accounts
  are configured to have fewer user rights on the system could be less
  impacted than users who operate with administrative user rights.

  This security update is rated Critical for Internet Explorer 6, Internet
  Explorer 7, and Internet Explorer 8. For more information, see the
  subsection, Affected and Non-Affected Software, in this section.

  The security update addresses the vulnerabilities by modifying the way that
  Internet Explorer handles objects in memory and script during certain
  processes. For more information about the vulnerabilities, see the
  Frequently Asked Questions (FAQ) subsection for the specific vulnerability
  entry under the next section, Vulnerability Information.

  This security update also addresses the vulnerability first described in
  Microsoft Security Advisory 2458511.

Affected Software

  Windows XP Service Pack 3
  Windows XP Professional x64 Edition Service Pack 2
  Windows Vista Service Pack 1 and Windows Vista Service Pack 2
  Windows Vista x64 Edition Service Pack 1
  Windows Vista x64 Edition Service Pack 2
  Windows 7 for 32-bit Systems
  Windows 7 for x64-based Systems
  Windows Server 2003 Service Pack 2
  Windows Server 2003 with SP2 for Itanium-based Systems
  Windows Server 2003 x64 Edition Service Pack 2
  Windows Server 2008 for 32-bit Systems **
  Windows Server 2008 for 32-bit Systems Service Pack 2 **
  Windows Server 2008 for Itanium-based Systems
  Windows Server 2008 for Itanium-based Systems Service Pack 2
  Windows Server 2008 for x64-based Systems **
  Windows Server 2008 for x64-based Systems Service Pack 2 **
  Windows Server 2008 R2 for Itanium-based Systems
  Windows Server 2008 R2 for x64-based Systems **

    **Server Core installation not affected.

Vulnerability Information

HTML Object Memory Corruption Vulnerability - CVE-2010-3340

  A remote code execution vulnerability exists in the way that Internet
  Explorer accesses an object that has not been correctly initialized or has
  been deleted. An attacker could exploit the vulnerability by constructing a
  specially crafted Web page. When a user views the Web page, the
  vulnerability could allow remote code execution. An attacker who
  successfully exploited this vulnerability could gain the same user rights as
  the logged-on user. If a user is logged on with administrative user rights,
  an attacker who successfully exploited this vulnerability could take
  complete control of an affected system. An attacker could then install
  programs; view, change, or delete data; or create new accounts with full
  user rights.

Cross-Domain Information Disclosure Vulnerability - CVE-2010-3342

  An information disclosure vulnerability exists in Internet Explorer that
  could allow script to gain access to information in another domain or
  Internet Explorer zone. An attacker could exploit the vulnerability by
  constructing a specially crafted Web page that could allow information
  disclosure if a user viewed the Web page. An attacker who successfully
  exploited this vulnerability could view content from another domain or
  Internet Explorer zone.

HTML Object Memory Corruption Vulnerability - CVE-2010-3343

  A remote code execution vulnerability exists in the way that Internet
  Explorer accesses an object that has not been correctly initialized or has
  been deleted. An attacker could exploit the vulnerability by constructing a
  specially crafted Web page. When a user views the Web page, the
  vulnerability could allow remote code execution. An attacker who
  successfully exploited this vulnerability could gain the same user rights as
  the logged-on user. If a user is logged on with administrative user rights,
  an attacker who successfully exploited this vulnerability could take
  complete control of an affected system. An attacker could then install
  programs; view, change, or delete data; or create new accounts with full
  user rights.

HTML Element Memory Corruption Vulnerability - CVE-2010-3345

  A remote code execution vulnerability exists in the way that Internet
  Explorer accesses an object that has not been correctly initialized or has
  been deleted. An attacker could exploit the vulnerability by constructing a
  specially crafted Web page. When a user views the Web page, the
  vulnerability could allow remote code execution. An attacker who
  successfully exploited this vulnerability could gain the same user rights as
  the logged-on user. If a user is logged on with administrative user rights,
  an attacker who successfully exploited this vulnerability could take
  complete control of an affected system. An attacker could then install
  programs; view, change, or delete data; or create new accounts with full
  user rights.

HTML Element Memory Corruption Vulnerability - CVE-2010-3346

  A remote code execution vulnerability exists in the way that Internet
  Explorer accesses an object that has not been correctly initialized or has
  been deleted. An attacker could exploit the vulnerability by constructing a
  specially crafted Web page. When a user views the Web page, the
  vulnerability could allow remote code execution. An attacker who
  successfully exploited this vulnerability could gain the same user rights as
  the logged-on user. If a user is logged on with administrative user rights,
  an attacker who successfully exploited this vulnerability could take
  complete control of an affected system. An attacker could then install
  programs; view, change, or delete data; or create new accounts with full
  user rights.

Cross-Domain Information Disclosure Vulnerability - CVE-2010-3348

  An information disclosure vulnerability exists in Internet Explorer that
  could allow script to gain access to information in another domain or
  Internet Explorer zone. An attacker could exploit the vulnerability by
  constructing a specially crafted Web page that could allow information
  disclosure if a user viewed the Web page. An attacker who successfully
  exploited this vulnerability could view content from another domain or
  Internet Explorer zone.

Uninitialized Memory Corruption Vulnerability - CVE-2010-3962

  A remote code execution vulnerability exists in the way that Internet
  Explorer accesses an object that has not been correctly initialized or has
  been deleted. An attacker could exploit the vulnerability by convincing the
  user to open a malicious Word document. When a user closes the document, the
  vulnerability could allow remote code execution. An attacker who
  successfully exploited this vulnerability could gain the same user rights as
  the logged-on user. If a user is logged on with administrative user rights,
  an attacker who successfully exploited this vulnerability could take
  complete control of an affected system. An attacker could then install
  programs; view, change, or delete data; or create new accounts with full
  user rights.

======================================================================

          =========================================================
          Les serveurs de référence du CERT-Renater
          http://www.urec.fr/securite
          http://www.cru.fr/securite
          http://www.renater.fr
          =========================================================
          + CERT-RENATER          | tel : 01-53-94-20-44          +
          + 23 - 25 Rue Daviel    | fax : 01-53-94-20-41          +
          + 75013 Paris           | email: certsvp@renater.fr     +
          =========================================================

