Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability."
References
Link | Resource |
---|---|
http://blogs.technet.com/b/srd/archive/2013/10/08/ms13-080-addresses-two-vulnerabilities-under-limited-targeted-attacks.aspx | Broken Link Vendor Advisory |
http://www.us-cert.gov/ncas/alerts/TA13-288A | Third Party Advisory US Government Resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-080 | Patch Vendor Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18989 | Broken Link |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
No history.
Information
Published : 2013-10-09 14:54
Updated : 2024-07-16 17:35
NVD link : CVE-2013-3897
Mitre link : CVE-2013-3897
CVE.ORG link : CVE-2013-3897
JSON object : View
Products Affected
microsoft
- windows_server_2003
- windows_vista
- windows_server_2012
- windows_xp
- windows_8.1
- windows_7
- windows_rt_8.1
- internet_explorer
- windows_8
- windows_server_2008
CWE
CWE-416
Use After Free