First published: Tue Jun 08 2010(Updated: )
Unspecified vulnerability in Microsoft IIS 6.0, 7.0, and 7.5, when Extended Protection for Authentication is enabled, allows remote authenticated users to execute arbitrary code via unknown vectors related to "token checking" that trigger memory corruption, aka "IIS Authentication Memory Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Microsoft Internet Information Services | =6.0 | |
Any of | ||
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2003 | =sp2 | |
Any of | ||
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Any of | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Any of | ||
Microsoft Windows 7 | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 | |
Microsoft Internet Information Services | =6.0 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1256 has a critical severity rating due to its potential for remote code execution.
To fix CVE-2010-1256, you should apply the latest security patches provided by Microsoft for IIS versions 6.0, 7.0, and 7.5.
CVE-2010-1256 affects Microsoft IIS versions 6.0, 7.0, and 7.5 when Extended Protection for Authentication is enabled.
Yes, CVE-2010-1256 allows remote authenticated users to exploit the vulnerability, potentially leading to arbitrary code execution.
In the context of CVE-2010-1256, 'memory corruption' refers to the unintended overwrite of the memory, which can lead to system instability or hijacking by an attacker.