First published: Wed Mar 31 2010(Updated: )
The Tabular Data Control (TDC) ActiveX control in Microsoft Internet Explorer 5.01 SP4, 6 on Windows XP SP2 and SP3, and 6 SP1 allows remote attackers to execute arbitrary code via a long URL (DataURL parameter) that triggers memory corruption in the CTDCCtl::SecurityCHeckDataURL function, aka "Memory Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =5.01-sp4 | |
Internet Explorer | =6-sp1 | |
Microsoft Windows 2000 | =sp4 | |
Internet Explorer | =6 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0805 is categorized as a critical vulnerability due to its potential to allow remote code execution.
The recommended fix for CVE-2010-0805 is to upgrade to a supported version of Internet Explorer or apply available security patches.
CVE-2010-0805 affects Microsoft Internet Explorer 5.01 SP4, 6 SP1, and 6 on various Windows operating systems.
Yes, CVE-2010-0805 can be exploited remotely through specially crafted URLs that trigger memory corruption.
CVE-2010-0805 facilitates arbitrary code execution attacks, allowing attackers to run malicious code on the victim's system.