ID

VAR-201006-1235


CVE

CVE-2010-1256


TITLE

Microsoft IIS Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2010-001613

DESCRIPTION

Unspecified vulnerability in Microsoft IIS 6.0, 7.0, and 7.5, when Extended Protection for Authentication is enabled, allows remote authenticated users to execute arbitrary code via unknown vectors related to "token checking" that trigger memory corruption, aka "IIS Authentication Memory Corruption Vulnerability.". Microsoft IIS is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. This issue affects IIS 6.0, 7.0 and 7.5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA10-159B Microsoft Updates for Multiple Vulnerabilities Original release date: June 08, 2010 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Microsoft Office * Microsoft SharePoint Services * Microsoft .NET Framework Overview Microsoft has released updates to address vulnerabilities in Microsoft Windows, Microsoft Internet Explorer, Microsoft Office, Microsoft SharePoint Services, and Microsoft .NET Framework. I. Description The Microsoft Security Bulletin Summary for June 2010 describes vulnerabilities in Microsoft Windows, Internet Explorer, Office, SharePoint Services, and .NET Framework. Microsoft has released updates to address the vulnerabilities. II. III. Solution Apply updates Microsoft has provided updates for these vulnerabilities in the Microsoft Security Bulletin Summary for June 2010. The security bulletin describes any known issues related to the updates. Administrators are encouraged to note these issues and test for any potentially adverse effects. Administrators should consider using an automated update distribution system such as Windows Server Update Services (WSUS). IV. References * Microsoft Security Bulletin Summary for June 2010 - <http://www.microsoft.com/technet/security/bulletin/ms10-jun.mspx> * Microsoft Windows Server Update Services - <http://technet.microsoft.com/en-us/wsus/default.aspx> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA10-159B.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA10-159B Feedback VU#855166" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2010 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History June 08, 2010: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBTA6Wzj6pPKYJORa3AQLl4Qf/dTsaW53BBruyFOcypbooTw5ULG9E5wPa /DEiksCuX8hYOoev9jDDyhXZQIaE2OrkWdLpJJBtXwJJ4XhBqyni3fhQFrIkwGVQ 3w3068TGE6v/sjV/W/qWmkZjl4r+FIcR9VRlulLet9ZZAxoJ7VgTg/1O8eixr7SO HpO+Xb3l3d4/XUGtTKCu5DsTTD1l6qQr66m3l4o26Bj834qfh0fvfneZHXCy3PUH /lE3nFxH3M+JOQEdapgc/aYVnrcroZKix61lfs2S1NIUxvBAxea0UFZtywIId0hK Sh2LGp7tUlXpfk8oo8LMgKG1y25xYmLE5WYIhO4E6Mas3jT/9ArwHQ== =mq6Z -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management Free webinars http://secunia.com/vulnerability_scanning/corporate/webinars/ ---------------------------------------------------------------------- TITLE: Microsoft Internet Information Services Authentication Memory Corruption SECUNIA ADVISORY ID: SA40079 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40079/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40079 RELEASE DATE: 2010-06-09 DISCUSS ADVISORY: http://secunia.com/advisories/40079/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/40079/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=40079 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Microsoft Internet Information Services, which can be exploited by malicious users to potentially compromise a vulnerable system. The vulnerability is caused due to improper handling of authentication tokens and can be exploited to corrupt memory via a specially a crafted authentication packet. Successful exploitation requires the "Extended Protection for Authentication" feature to be enabled (disabled by default). SOLUTION: Apply patches. Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: MS10-040 (KB982666): http://www.microsoft.com/technet/security/bulletin/MS10-040.mspx OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2010-1256 // JVNDB: JVNDB-2010-001613 // BID: 40573 // VULMON: CVE-2010-1256 // PACKETSTORM: 90440 // PACKETSTORM: 90391

AFFECTED PRODUCTS

vendor:microsoftmodel:iisscope:eqversion:7.5

Trust: 1.7

vendor:microsoftmodel:iisscope:eqversion:7.0

Trust: 1.7

vendor:microsoftmodel:iisscope:eqversion:6.0

Trust: 1.7

vendor:microsoftmodel:internet information serverscope:eqversion:6.0

Trust: 1.0

vendor:microsoftmodel:windows 7scope:eqversion:(x32)

Trust: 0.8

vendor:microsoftmodel:windows 7scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:none

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(itanium)

Trust: 0.8

vendor:microsoftmodel:windows server 2003scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(itanium)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(x64)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:(x86)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:r2(itanium)

Trust: 0.8

vendor:microsoftmodel:windows server 2008scope:eqversion:r2(x64)

Trust: 0.8

vendor:microsoftmodel:windows vistascope:eqversion:none

Trust: 0.8

vendor:microsoftmodel:windows vistascope:eqversion:(x64)

Trust: 0.8

vendor:avayamodel:messaging application server mmscope:eqversion:3.1

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:3.0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:messaging application server mmscope:eqversion:1.1

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:5

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:4

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:0

Trust: 0.3

vendor:avayamodel:meeting exchange webportalscope:eqversion:-6.0

Trust: 0.3

vendor:avayamodel:meeting exchange web conferencing serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange streaming serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange recording serverscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:meeting exchange client registration serverscope:eqversion:-0

Trust: 0.3

sources: BID: 40573 // JVNDB: JVNDB-2010-001613 // CNNVD: CNNVD-201006-096 // NVD: CVE-2010-1256

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-1256
value: HIGH

Trust: 1.0

NVD: CVE-2010-1256
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201006-096
value: HIGH

Trust: 0.6

VULMON: CVE-2010-1256
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-1256
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2010-1256
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: VULMON: CVE-2010-1256 // JVNDB: JVNDB-2010-001613 // CNNVD: CNNVD-201006-096 // NVD: CVE-2010-1256

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.8

sources: JVNDB: JVNDB-2010-001613 // NVD: CVE-2010-1256

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201006-096

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201006-096

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001613

PATCH

title:MS10-040url:http://www.microsoft.com/technet/security/bulletin/MS10-040.mspx

Trust: 0.8

title:MS10-040url:http://www.microsoft.com/japan/technet/security/bulletin/ms10-040.mspx

Trust: 0.8

title:MS10-040eurl:http://www.microsoft.com/japan/security/bulletins/MS10-040e.mspx

Trust: 0.8

title:TA10-159Burl:http://software.fujitsu.com/jp/security/vulnerabilities/ta10-159b.html

Trust: 0.8

sources: JVNDB: JVNDB-2010-001613

EXTERNAL IDS

db:BIDid:40573

Trust: 2.8

db:NVDid:CVE-2010-1256

Trust: 2.8

db:USCERTid:TA10-159B

Trust: 2.6

db:SECUNIAid:40079

Trust: 0.9

db:XFid:58864

Trust: 0.8

db:USCERTid:SA10-159B

Trust: 0.8

db:VUPENid:ADV-2010-1397

Trust: 0.8

db:JVNDBid:JVNDB-2010-001613

Trust: 0.8

db:CNNVDid:CNNVD-201006-096

Trust: 0.6

db:VULMONid:CVE-2010-1256

Trust: 0.1

db:PACKETSTORMid:90440

Trust: 0.1

db:PACKETSTORMid:90391

Trust: 0.1

sources: VULMON: CVE-2010-1256 // BID: 40573 // JVNDB: JVNDB-2010-001613 // PACKETSTORM: 90440 // PACKETSTORM: 90391 // CNNVD: CNNVD-201006-096 // NVD: CVE-2010-1256

REFERENCES

url:http://www.securityfocus.com/bid/40573

Trust: 2.6

url:http://www.us-cert.gov/cas/techalerts/ta10-159b.html

Trust: 2.5

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/58864

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7149

Trust: 1.7

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-040

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1256

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/58864

Trust: 0.8

url:http://www.jpcert.or.jp/at/2010/at100014.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnta10-159b/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1256

Trust: 0.8

url:http://secunia.com/advisories/40079

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa10-159b.html

Trust: 0.8

url:http://www.vupen.com/english/advisories/2010/1397

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/#topics

Trust: 0.8

url:http://www.microsoft.com/technet/security/bulletin/ms10-040.mspx

Trust: 0.4

url:http://www.microsoft.com/windowsserver2003/iis/default.mspx

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100089659

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/94.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=20587

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta10-159b.html>

Trust: 0.1

url:http://www.microsoft.com/technet/security/bulletin/ms10-jun.mspx>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://technet.microsoft.com/en-us/wsus/default.aspx>

Trust: 0.1

url:http://secunia.com/advisories/40079/

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/40079/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/webinars/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=40079

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULMON: CVE-2010-1256 // BID: 40573 // JVNDB: JVNDB-2010-001613 // PACKETSTORM: 90440 // PACKETSTORM: 90391 // CNNVD: CNNVD-201006-096 // NVD: CVE-2010-1256

CREDITS

Microsoft

Trust: 0.6

sources: CNNVD: CNNVD-201006-096

SOURCES

db:VULMONid:CVE-2010-1256
db:BIDid:40573
db:JVNDBid:JVNDB-2010-001613
db:PACKETSTORMid:90440
db:PACKETSTORMid:90391
db:CNNVDid:CNNVD-201006-096
db:NVDid:CVE-2010-1256

LAST UPDATE DATE

2024-11-23T20:28:30.323000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2010-1256date:2021-02-05T00:00:00
db:BIDid:40573date:2010-07-05T16:17:00
db:JVNDBid:JVNDB-2010-001613date:2010-07-05T00:00:00
db:CNNVDid:CNNVD-201006-096date:2019-07-08T00:00:00
db:NVDid:CVE-2010-1256date:2024-11-21T01:13:59.397

SOURCES RELEASE DATE

db:VULMONid:CVE-2010-1256date:2010-06-08T00:00:00
db:BIDid:40573date:2010-06-08T00:00:00
db:JVNDBid:JVNDB-2010-001613date:2010-07-05T00:00:00
db:PACKETSTORMid:90440date:2010-06-09T01:41:01
db:PACKETSTORMid:90391date:2010-06-08T14:50:58
db:CNNVDid:CNNVD-201006-096date:2010-06-11T00:00:00
db:NVDid:CVE-2010-1256date:2010-06-08T20:30:02.367