Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.
References
Link | Resource |
---|---|
http://technet.microsoft.com/security/advisory/2847140 | Mitigation Patch Vendor Advisory |
http://www.exploit-db.com/exploits/25294 | Exploit VDB Entry |
http://www.us-cert.gov/ncas/alerts/TA13-134A | Third Party Advisory US Government Resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16727 | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-038 |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2013-05-05 04:07
Updated : 2020-09-28 05:58
NVD link : CVE-2013-1347
Mitre link : CVE-2013-1347
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
microsoft
- windows_7
- windows_vista
- windows_xp
- windows_server_2008
- internet_explorer
- windows_server_2003