Executive Summary

Informations
NameCVE-2009-1528First vendor Publication2009-06-10
VendorCveLast vendor Modification2019-02-26

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Microsoft Internet Explorer 6 and 7 for Windows XP SP2 and SP3; 6 and 7 for Server 2003 SP2; 7 for Vista Gold, SP1, and SP2; and 7 for Server 2008 SP2 does not properly synchronize AJAX requests, which allows allows remote attackers to execute arbitrary code via a large number of concurrent, asynchronous XMLHttpRequest calls, aka "HTML Object Memory Corruption Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1528

CAPEC : Common Attack Pattern Enumeration & Classification

idName
CAPEC-8Buffer Overflow in an API Call
CAPEC-9Buffer Overflow in Local Command-Line Utilities
CAPEC-10Buffer Overflow via Environment Variables
CAPEC-14Client-side Injection-induced Buffer Overflow
CAPEC-24Filter Failure through Buffer Overflow
CAPEC-42MIME Conversion
CAPEC-44Overflow Binary Resource File
CAPEC-45Buffer Overflow via Symbolic Links
CAPEC-46Overflow Variables and Tags
CAPEC-47Buffer Overflow via Parameter Expansion
CAPEC-100Overflow Buffers

CWE : Common Weakness Enumeration

%idName
100 %CWE-399Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:6260
 
Oval ID: oval:org.mitre.oval:def:6260
Title: HTML Object Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 6 and 7 for Windows XP SP2 and SP3; 6 and 7 for Server 2003 SP2; 7 for Vista Gold, SP1, and SP2; and 7 for Server 2008 SP2 does not properly synchronize AJAX requests, which allows allows remote attackers to execute arbitrary code via a large number of concurrent, asynchronous XMLHttpRequest calls, aka "HTML Object Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2009-1528
Version: 7
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Product(s): Microsoft Internet Explorer
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application2
Os4
Os4
Os5
Os6

OpenVAS Exploits

DateDescription
2009-06-10Name : Cumulative Security Update for Internet Explorer (969897)
File : nvt/secpod_ms09-019.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
54947Microsoft IE Crafted AJAX XMLHttpRequest Synchronization Memory Corruption

Snort® IPS/IDS

DateDescription
2017-02-03Microsoft Internet Explorer layout object use after free attempt
RuleID : 41107 - Revision : 1 - Type : BROWSER-IE
2014-11-16Microsoft Internet Explorer Unexpected method call remote code execution attempt
RuleID : 31402 - Revision : 2 - Type : BROWSER-IE
2014-01-10Microsoft Internet Explorer event handler memory corruption attempt
RuleID : 17566 - Revision : 9 - Type : BROWSER-IE
2014-01-10Microsoft Internet Explorer layout object use after free attempt
RuleID : 15540 - Revision : 16 - Type : BROWSER-IE
2014-01-10Microsoft Internet Explorer onreadystatechange memory corruption attempt
RuleID : 15538 - Revision : 10 - Type : BROWSER-IE
2014-01-10Microsoft Internet Explorer invalid object modification exploit attempt
RuleID : 15536 - Revision : 7 - Type : BROWSER-IE
2014-01-10Microsoft Internet Explorer setCapture heap corruption exploit attempt
RuleID : 15535 - Revision : 12 - Type : BROWSER-IE
2014-01-10Microsoft Internet Explorer XML HttpRequest race condition exploit attempt
RuleID : 15534 - Revision : 10 - Type : BROWSER-IE
2014-01-10Microsoft Internet Explorer Unexpected method call remote code execution attempt
RuleID : 15531 - Revision : 10 - Type : BROWSER-IE
2014-01-10Microsoft Internet Explorer cross-domain navigation cookie stealing attempt
RuleID : 15529 - Revision : 9 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

DateDescription
2009-06-10Name : Arbitrary code can be executed on the remote host through a web browser.
File : smb_nt_ms09-019.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/35222
BUGTRAQ http://www.securityfocus.com/archive/1/504206/100/0/threaded
CERT http://www.us-cert.gov/cas/techalerts/TA09-160A.html
MISC http://www.zerodayinitiative.com/advisories/ZDI-09-037
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09...
SECTRACK http://www.securitytracker.com/id?1022350
VUPEN http://www.vupen.com/english/advisories/2009/1538

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
DateInformations
2019-02-26 17:19:31
  • Multiple Updates
2018-10-13 00:22:49
  • Multiple Updates
2018-10-11 00:19:36
  • Multiple Updates
2017-09-29 09:24:12
  • Multiple Updates
2016-06-28 17:40:43
  • Multiple Updates
2016-04-26 18:48:09
  • Multiple Updates
2014-02-17 10:49:53
  • Multiple Updates
2014-01-19 21:25:52
  • Multiple Updates
2013-05-10 23:49:46
  • Multiple Updates