Executive Summary

Informations
Name CVE-2013-3893 First vendor Publication 2013-09-18
Vendor Cve Last vendor Modification 2021-05-17

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3893

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:18665
 
Oval ID: oval:org.mitre.oval:def:18665
Title: Internet Explorer Memory Corruption Vulnerability (CVE-2013-3893) - MS13-080
Description: Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
Family: windows Class: vulnerability
Reference(s): CVE-2013-3893
Version: 6
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Microsoft Windows XP
Product(s): Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7

SAINT Exploits

Description Link
Internet Explorer HTML Rendering Engine onLoseCapture Use-After-Free Vulnerability More info here

ExploitDB Exploits

id Description
2013-12-03 Microsoft Tagged Image File Format (TIFF) Integer Overflow
2013-10-15 MS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free
2013-10-02 Micorosft Internet Explorer SetMouseCapture Use-After-Free

Information Assurance Vulnerability Management (IAVM)

Date Description
2013-10-10 IAVM : 2013-A-0188 - Cumulative Security Update for Microsoft Internet Explorer
Severity : Category I - VMSKEY : V0040759

Snort® IPS/IDS

Date Description
2019-04-11 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 49375 - Revision : 1 - Type : BROWSER-IE
2019-04-11 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 49374 - Revision : 1 - Type : BROWSER-IE
2016-03-24 Microsoft Internet Explorer swapNode memory corruption attempt
RuleID : 37837 - Revision : 2 - Type : BROWSER-IE
2016-03-24 Microsoft Internet Explorer swapNode memory corruption attempt
RuleID : 37836 - Revision : 2 - Type : BROWSER-IE
2015-03-31 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 33606 - Revision : 3 - Type : BROWSER-IE
2015-03-31 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 33605 - Revision : 3 - Type : BROWSER-IE
2014-05-01 Microsoft Internet Explorer HtmlLayout SmartObject use after free attempt
RuleID : 30289 - Revision : 3 - Type : BROWSER-IE
2014-04-10 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 30105 - Revision : 3 - Type : BROWSER-IE
2014-04-10 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 30104 - Revision : 3 - Type : BROWSER-IE
2014-04-10 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 30103 - Revision : 3 - Type : BROWSER-IE
2014-04-10 Microsoft Internet Explorer CAnchorElement use after free attempt
RuleID : 30102 - Revision : 3 - Type : BROWSER-IE
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28526 - Revision : 8 - Type : FILE-OFFICE
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28525 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28473 - Revision : 8 - Type : FILE-OFFICE
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28472 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28471 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28470 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28469 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28468 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28467 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28466 - Revision : 10 - Type : FILE-OFFICE
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28465 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 Microsoft Office GDI library TIFF handling integer overflow attempt
RuleID : 28464 - Revision : 9 - Type : FILE-OFFICE
2014-01-10 Microsoft Internet Explorer swapNode memory corruption attempt
RuleID : 28208 - Revision : 9 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer swapNode memory corruption attempt
RuleID : 28207 - Revision : 9 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer deleted object memory corruption attempt
RuleID : 28204 - Revision : 2 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer HtmlLayout SmartObject use after free attempt
RuleID : 28163 - Revision : 4 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer CElement use after free attempt
RuleID : 28160 - Revision : 2 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer CLayoutBlock use after free attempt
RuleID : 28159 - Revision : 2 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer CLayoutBlock use after free attempt
RuleID : 28158 - Revision : 2 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer STextBlockPosition use after free attempt
RuleID : 28151 - Revision : 3 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer onlosecapture memory corruption attempt
RuleID : 27944 - Revision : 11 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer onlosecapture memory corruption attempt
RuleID : 27943 - Revision : 10 - Type : BROWSER-IE

Metasploit Database

id Description
2013-09-17 MS13-080 Microsoft Internet Explorer SetMouseCapture Use-After-Free
2013-10-08 MS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free

Nessus® Vulnerability Scanner

Date Description
2013-12-11 Name : The remote Windows host has a remote code execution vulnerability.
File : smb_nt_ms13-096.nasl - Type : ACT_GATHER_INFO
2013-10-09 Name : The remote host is affected by multiple code execution vulnerabilities.
File : smb_nt_ms13-080.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/62453
CERT http://www.us-cert.gov/ncas/alerts/TA13-288A
CONFIRM http://blogs.technet.com/b/srd/archive/2013/09/17/cve-2013-3893-fix-it-workar...
http://blogs.technet.com/b/srd/archive/2013/10/08/ms13-080-addresses-two-vuln...
http://technet.microsoft.com/security/advisory/2887505
JVN http://jvn.jp/en/jp/JVN27443259/index.html
JVNDB http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000093.html
MISC http://packetstormsecurity.com/files/162585/Microsoft-Internet-Explorer-8-Set...
http://pastebin.com/raw.php?i=Hx1L5gu6
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13...
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Date Informations
2021-05-17 21:23:23
  • Multiple Updates
2021-05-04 12:27:03
  • Multiple Updates
2021-04-22 01:32:45
  • Multiple Updates
2020-05-23 13:17:03
  • Multiple Updates
2020-05-23 00:37:49
  • Multiple Updates
2018-10-13 05:18:41
  • Multiple Updates
2017-09-19 09:26:14
  • Multiple Updates
2016-11-29 00:24:49
  • Multiple Updates
2014-02-17 11:21:30
  • Multiple Updates
2014-01-24 13:19:18
  • Multiple Updates
2014-01-19 21:29:33
  • Multiple Updates
2014-01-03 17:19:04
  • Multiple Updates
2013-12-20 13:19:33
  • Multiple Updates
2013-11-11 12:40:42
  • Multiple Updates
2013-11-04 21:28:18
  • Multiple Updates
2013-10-18 17:22:11
  • Multiple Updates
2013-10-11 13:26:59
  • Multiple Updates
2013-10-06 17:18:47
  • Multiple Updates
2013-09-27 21:20:17
  • Multiple Updates
2013-09-19 13:19:47
  • Multiple Updates
2013-09-19 00:19:46
  • Multiple Updates
2013-09-18 17:19:56
  • First insertion