First published: Fri Jan 22 2010(Updated: )
The URL validation functionality in Microsoft Internet Explorer 5.01, 6, 6 SP1, 7 and 8, and the ShellExecute API function in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, does not properly process input parameters, which allows remote attackers to execute arbitrary local programs via a crafted URL, aka "URL Validation Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =8 | |
Internet Explorer | =8.0.6001 | |
Microsoft Windows 7 | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | ||
Microsoft Windows Vista | ||
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
Internet Explorer | =7 | |
Internet Explorer | =7.0 | |
Internet Explorer | =7.0.5730-unknown | |
Internet Explorer | =7.0.5730.11 | |
Internet Explorer | =7.00.5730.1100 | |
Internet Explorer | =7.00.6000.16386 | |
Internet Explorer | =7.00.6000.16441 | |
Internet Explorer | =5.01-sp4 | |
Internet Explorer | =6 | |
Internet Explorer | =6-sp1 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0027 is classified as a critical vulnerability due to its ability to allow attackers to execute arbitrary local programs on affected systems.
To fix CVE-2010-0027, users should apply the latest security updates or patches provided by Microsoft for Internet Explorer and Windows operating systems.
CVE-2010-0027 affects various versions of Microsoft Internet Explorer up to version 8 and several Windows operating systems including Windows 2000, XP, and Server 2003.
Yes, CVE-2010-0027 can be exploited remotely, allowing attackers to execute malicious code without physical access to the system.
Exploiting CVE-2010-0027 can lead to unauthorized access, data theft, and control over the affected systems.