The vulnerability refers to cyberattacks, linked to the Nobel Peace Prize ceremony and G20-related malicious spam campaign reported in October 2010.
Exploit: Win32/CVE-2010-3962.A.
Vulnerability details
Advisory: SB2010110302 - Use-after-free when parsing CSS in Internet Explorer
Vulnerable component: Microsoft Internet Explorer
CVE-ID: CVE-2010-3962
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C
CWE-ID: CWE-416 - Use After Free
Description:
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to use-after-free error when processing CSS token sequences and the clip attribute. A remote attacker can create a specially crafted HTML page, trick the victim into visiting it, cause memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Note: this vulnerability is being actively exploited.
Known APT campaigns:
Nobel Peace Prize ceremony beach
The group behind this attack was also behind Sunshop.
The attack server located in Taiwan spread malicious HTML file as Trojan.Malscript and the downloaded threat as Backdoor.Belmoo.Public Exploits:
- Microsoft Internet Explorer - CSS SetUserClip Memory Corruption (MS10-090) (Metasploit) [Exploit-DB]
- Microsoft Internet Explorer 6/7/8 - Memory Corruption [Exploit-DB]
- Microsoft Internet Explorer - Memory Corruption [Exploit-DB]
External links:
https://technet.microsoft.com/library/security/ms10-090 https://technet.microsoft.com/library/security/2458511
https://blogs.technet.microsoft.com/msrc/2010/11/02/microsoft-releases-security-advisory-2458511/
https://blogs.technet.microsoft.com/srd/2010/11/03/dep-emet-protect-against-attacks-on-the-latest-in...
https://www.symantec.com/security_response/writeup.jsp?docid=2010-110314-3703-99
https://www.symantec.com/connect/blogs/new-ie-0-day-used-targeted-attacks
http://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/79/cve20103962-yet-another-zeroday...
https://www.zscaler.com/blogs/research/obfuscated-exploits-continue-target-cve-2010-0806-and-cve-201...
http://security.bkav.com/home/-/blogs/new-ie-zero-day-vulnerability-cve-2010-3962-/normal
http://www.mcafee.com/threat-intelligence/malware/default.aspx?id=301764
https://blogs.technet.microsoft.com/mmpc/2010/12/09/cve-2010-3962-the-weekend-warrior/
https://www.malwaredomainlist.com/forums/index.php?topic=4399.0
http://global.ahnlab.com/global/upload/download/asecreport/ASEC_Report_Vol.11_Eng.pdf