Executive Summary

Summary
TitleVulnerability in Internet Explorer Could Allow Remote Code Execution
Informations
NameKB2847140First vendor Publication2013-05-03
VendorMicrosoftLast vendor Modification2013-05-14
Severity (Vendor) N/ARevision2.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

General Information

Executive Summary

Microsoft has completed the investigation into a public report of this vulnerability. We have issued MS13-038 to address this issue. For more information about this issue, including download links for an available security update, please review MS13-038. The vulnerability addressed is the Internet Explorer Use After Free Vulnerability - CVE-2013-1347.

Original Source

Url : http://www.microsoft.com/technet/security/advisory/2847140.mspx

CWE : Common Weakness Enumeration

%idName
100 %CWE-94Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:16727
 
Oval ID: oval:org.mitre.oval:def:16727
Title: Internet Explorer Use After Free Vulnerability - MS13-038
Description: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.
Family: windows Class: vulnerability
Reference(s): CVE-2013-1347
Version: 5
Platform(s): Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 7
Product(s): Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1
Os2
Os1
Os4
Os2
Os4

SAINT Exploits

DescriptionLink
Internet Explorer CGenericElement Object Use-after-free VulnerabilityMore info here

Snort® IPS/IDS

DateDescription
2014-01-10Private exploit kit outbound traffic
RuleID : 27144-community - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Private exploit kit outbound traffic
RuleID : 27144 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Private exploit kit landing page
RuleID : 27143 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Private exploit kit landing page
RuleID : 27142 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Private exploit kit landing page
RuleID : 27141 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Private exploit kit numerically named exe file dowload
RuleID : 27140 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Microsoft Internet Explorer null object access attempt
RuleID : 26668 - Revision : 3 - Type : BROWSER-IE
2014-01-10Microsoft Internet Explorer ANIMATECOLOR SMIL access attempt
RuleID : 26666 - Revision : 5 - Type : BROWSER-IE
2014-01-10Microsoft Internet Explorer null object access attempt
RuleID : 26572 - Revision : 4 - Type : BROWSER-IE
2014-01-10Microsoft Internet Explorer null object access attempt
RuleID : 26571 - Revision : 3 - Type : BROWSER-IE
2014-01-10Microsoft Internet Explorer null object access attempt
RuleID : 26570 - Revision : 5 - Type : BROWSER-IE
2014-01-10Microsoft Internet Explorer null object access attempt
RuleID : 26569 - Revision : 4 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

DateDescription
2013-05-15Name : The remote host is affected by a code execution vulnerability.
File : smb_nt_ms13-038.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
DateInformations
2013-05-15 05:18:05
  • Multiple Updates
2013-05-09 05:20:18
  • Multiple Updates
2013-05-09 05:18:17
  • Multiple Updates
2013-05-07 21:21:28
  • Multiple Updates
2013-05-06 17:20:28
  • Multiple Updates
2013-05-05 17:20:13
  • Multiple Updates
2013-05-04 05:18:38
  • First insertion