U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2010-0249

Change History

Modified Analysis by NIST 2/15/2024 4:06:48 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:*
          *cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:microsoft:internet_explorer:6:-:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*
          cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*
          cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
          cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*
          cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*
          cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_vista:-:*:*:*:-:*:x64:*
          cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*
          cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*
          cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
          cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*
          cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
          cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
          cpe:2.3:o:microsoft:windows_vista:-:*:*:*:-:*:x64:*
          cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:-:*:x64:*
          cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:-:*:x64:*
          cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
          cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
Removed CPE Configuration
AND
     OR
          *cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
          *cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*
          *cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
          *cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_2000:sp4:*:*:*:*:*:*:*

								
						
Removed CPE Configuration
AND
     OR
          *cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
          *cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*
          *cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
          *cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_xp:sp3:*:*:*:*:*:*:*

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-416
Removed CWE
NIST CWE-399

								
						
Changed Evaluator Description
Per: http://cwe.mitre.org/data/definitions/416.htmlhttp://cwe.mitre.org/data/definitions/416.html

CWE-416: Use After Free
Per: http://cwe.mitre.org/data/definitions/416.htmlhttp://cwe.mitre.org/data/definitions/416.html

CWE-416: Use After Free
Changed Reference Type
http://blogs.technet.com/msrc/archive/2010/01/14/security-advisory-979352.aspx Vendor Advisory
http://blogs.technet.com/msrc/archive/2010/01/14/security-advisory-979352.aspx Broken Link, Vendor Advisory
Changed Reference Type
http://news.cnet.com/8301-27080_3-10435232-245.html No Types Assigned
http://news.cnet.com/8301-27080_3-10435232-245.html Broken Link
Changed Reference Type
http://osvdb.org/61697 No Types Assigned
http://osvdb.org/61697 Broken Link
Changed Reference Type
http://securitytracker.com/id?1023462 No Types Assigned
http://securitytracker.com/id?1023462 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://support.microsoft.com/kb/979352 Vendor Advisory
http://support.microsoft.com/kb/979352 Patch, Vendor Advisory
Changed Reference Type
http://www.exploit-db.com/exploits/11167 No Types Assigned
http://www.exploit-db.com/exploits/11167 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.kb.cert.org/vuls/id/492515 US Government Resource
http://www.kb.cert.org/vuls/id/492515 Third Party Advisory, US Government Resource
Changed Reference Type
http://www.microsoft.com/technet/security/advisory/979352.mspx Vendor Advisory
http://www.microsoft.com/technet/security/advisory/979352.mspx Broken Link, Patch, Vendor Advisory
Changed Reference Type
http://www.securityfocus.com/bid/37815 Exploit
http://www.securityfocus.com/bid/37815 Broken Link, Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.us-cert.gov/cas/techalerts/TA10-055A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA10-055A.html Broken Link, Third Party Advisory, US Government Resource
Changed Reference Type
http://www.vupen.com/english/advisories/2010/0135 No Types Assigned
http://www.vupen.com/english/advisories/2010/0135 Broken Link
Changed Reference Type
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 No Types Assigned
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-002 Patch, Vendor Advisory
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/55642 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/55642 Third Party Advisory, VDB Entry
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6835 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6835 Broken Link