CVE-2013-3897
KEV
🔴 Łataj teraz
Wykorzystanie po zwolnieniu pamięci w mshtml.dll umożliwia zdalne wykonanie kodu.
CVSS
8.8
EPSS
88.2%
Exploit
weaponized
Vendor
microsoft
Opis źródłowy (NVD)
Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability."
dos
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 88.2% |
| Opublikowano (NVD) | 2013-10-09 14:54:25 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-22 16:42:04 UTC |
Referencje
- http://blogs.technet.com/b/srd/archive/2013/10/08/ms13-080-addresses-two-vulnerabilities-under-limited-targeted-attacks.aspx (secure@microsoft.com) [Broken Link, Vendor Advisory]
- http://www.us-cert.gov/ncas/alerts/TA13-288A (secure@microsoft.com) [Third Party Advisory, US Government Resource]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-080 (secure@microsoft.com) [Patch, Vendor Advisory]
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18989 (secure@microsoft.com) [Broken Link]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2013-3897 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]