Follow:

Policy:Win/IE.ActiveX.DoS!CVE-2010-3340

Severity rating
Critical

Class/Type
Policy

Discovered date
2010-12-14T00:00:00

Attack vector
Remote

Authentication required
No

Public exploits available
Yes

Signature detection
Medium



On this page




Description

A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted.



Impact

An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.



Technical details (analysis)

An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.



Affected software

Application1
Application2
Application3



Non-affected software

All applications not on the affected list.



References




Solutions




NIS signature

Name: Policy:Win/IE.ActiveX.DoS!CVE-2010-3340
Release Date: 2010-12-14T00:00:00



Known false positives

No known false positives at this time.



Work-arounds

Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones
Add sites that you trust to the Internet Explorer Trusted sites zone
Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone