First published: Wed Mar 31 2010(Updated: )
Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, and 6 SP1 allows remote attackers to execute arbitrary code by changing unspecified properties of an HTML object that has an onreadystatechange event handler, aka "HTML Object Memory Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =6 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
Internet Explorer | =5.01-sp4 | |
Internet Explorer | =6-sp1 | |
Microsoft Windows 2000 | =sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0491 is classified as a critical vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2010-0491, update your Internet Explorer to a supported version or apply the latest security patches provided by Microsoft.
CVE-2010-0491 affects Internet Explorer versions 5.01 SP4, 6, and 6 SP1.
CVE-2010-0491 enables attackers to execute arbitrary code on the target system via crafted HTML content.
CVE-2010-0491 impacts several Windows versions, including Windows XP, Windows Server 2003, and Windows 2000 with specific service packs.