← Back to CVEs
CVE-2010-3971
N/ADescription
Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a self-referential @import rule in a stylesheet, aka "CSS Memory Corruption Vulnerability."
CVE Details
CVSS v3.1 ScoreN/A
Published12/22/2010
Last Modified4/29/2026
Sourcenvd
Honeypot Sightings0
Affected Products
microsoft:internet_explorer
Weaknesses (CWE)
CWE-399
References
http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx(secure@microsoft.com)
http://seclists.org/fulldisclosure/2010/Dec/110(secure@microsoft.com)
http://secunia.com/advisories/42510(secure@microsoft.com)
http://support.avaya.com/css/P8/documents/100127294(secure@microsoft.com)
http://www.breakingpointsystems.com/community/blog/ie-vulnerability/(secure@microsoft.com)
http://www.exploit-db.com/exploits/15708(secure@microsoft.com)
http://www.exploit-db.com/exploits/15746(secure@microsoft.com)
http://www.kb.cert.org/vuls/id/634956(secure@microsoft.com)
http://www.microsoft.com/technet/security/advisory/2488013.mspx(secure@microsoft.com)
http://www.securityfocus.com/bid/45246(secure@microsoft.com)
http://www.securitytracker.com/id?1024922(secure@microsoft.com)
http://www.vupen.com/english/advisories/2010/3156(secure@microsoft.com)
http://www.vupen.com/english/advisories/2011/0318(secure@microsoft.com)
http://www.wooyun.org/bugs/wooyun-2010-0885(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-003(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12382(secure@microsoft.com)
http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2010/Dec/110(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/42510(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/css/P8/documents/100127294(af854a3a-2127-422b-91ae-364da2661108)
http://www.breakingpointsystems.com/community/blog/ie-vulnerability/(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/15708(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/15746(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/634956(af854a3a-2127-422b-91ae-364da2661108)
http://www.microsoft.com/technet/security/advisory/2488013.mspx(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/45246(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1024922(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/3156(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2011/0318(af854a3a-2127-422b-91ae-364da2661108)
http://www.wooyun.org/bugs/wooyun-2010-0885(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-003(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12382(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.