First published: Wed Mar 03 2010(Updated: )
vbscript.dll in VBScript 5.1, 5.6, 5.7, and 5.8 in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, allows user-assisted remote attackers to execute arbitrary code by referencing a (1) local pathname, (2) UNC share pathname, or (3) WebDAV server with a crafted .hlp file in the fourth argument (aka helpfile argument) to the MsgBox function, leading to code execution involving winhlp32.exe when the F1 key is pressed, aka "VBScript Help Keypress Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
Internet Explorer | =6 | |
Internet Explorer | =7 | |
Internet Explorer | =8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0483 has a CVSS base score of 7.5, indicating a high severity vulnerability.
To remediate CVE-2010-0483, users should apply the latest security updates from Microsoft for their affected operating systems.
CVE-2010-0483 affects Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2.
Exploiting CVE-2010-0483 allows attackers to execute arbitrary code on the victim's system under certain conditions.
Yes, the vulnerability requires Internet Explorer to be used to facilitate the code execution through specific references.