Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-1528 | First vendor Publication | 2009-06-10 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Internet Explorer 6 and 7 for Windows XP SP2 and SP3; 6 and 7 for Server 2003 SP2; 7 for Vista Gold, SP1, and SP2; and 7 for Server 2008 SP2 does not properly synchronize AJAX requests, which allows allows remote attackers to execute arbitrary code via a large number of concurrent, asynchronous XMLHttpRequest calls, aka "HTML Object Memory Corruption Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1528 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-8 | Buffer Overflow in an API Call |
CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
CAPEC-10 | Buffer Overflow via Environment Variables |
CAPEC-14 | Client-side Injection-induced Buffer Overflow |
CAPEC-24 | Filter Failure through Buffer Overflow |
CAPEC-42 | MIME Conversion |
CAPEC-44 | Overflow Binary Resource File |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-46 | Overflow Variables and Tags |
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CAPEC-100 | Overflow Buffers |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6260 | |||
Oval ID: | oval:org.mitre.oval:def:6260 | ||
Title: | HTML Object Memory Corruption Vulnerability | ||
Description: | Microsoft Internet Explorer 6 and 7 for Windows XP SP2 and SP3; 6 and 7 for Server 2003 SP2; 7 for Vista Gold, SP1, and SP2; and 7 for Server 2008 SP2 does not properly synchronize AJAX requests, which allows allows remote attackers to execute arbitrary code via a large number of concurrent, asynchronous XMLHttpRequest calls, aka "HTML Object Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-1528 | Version: | 7 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 2 |
OpenVAS Exploits
Date | Description |
---|---|
2009-06-10 | Name : Cumulative Security Update for Internet Explorer (969897) File : nvt/secpod_ms09-019.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
54947 | Microsoft IE Crafted AJAX XMLHttpRequest Synchronization Memory Corruption |
Snort® IPS/IDS
Date | Description |
---|---|
2017-02-03 | Microsoft Internet Explorer layout object use after free attempt RuleID : 41107 - Revision : 1 - Type : BROWSER-IE |
2014-11-16 | Microsoft Internet Explorer Unexpected method call remote code execution attempt RuleID : 31402 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer event handler memory corruption attempt RuleID : 17566 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer layout object use after free attempt RuleID : 15540 - Revision : 16 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer onreadystatechange memory corruption attempt RuleID : 15538 - Revision : 10 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer invalid object modification exploit attempt RuleID : 15536 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer setCapture heap corruption exploit attempt RuleID : 15535 - Revision : 12 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer XML HttpRequest race condition exploit attempt RuleID : 15534 - Revision : 10 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer Unexpected method call remote code execution attempt RuleID : 15531 - Revision : 10 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer cross-domain navigation cookie stealing attempt RuleID : 15529 - Revision : 9 - Type : BROWSER-IE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-06-10 | Name : Arbitrary code can be executed on the remote host through a web browser. File : smb_nt_ms09-019.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:11:06 |
|
2024-11-28 12:18:53 |
|
2023-12-07 21:28:06 |
|
2021-07-27 00:24:33 |
|
2021-07-24 01:44:11 |
|
2021-07-24 01:06:05 |
|
2021-07-23 21:25:00 |
|
2021-07-23 17:24:37 |
|
2020-05-23 00:23:43 |
|
2019-02-26 17:19:31 |
|
2018-10-13 00:22:49 |
|
2018-10-11 00:19:36 |
|
2017-09-29 09:24:12 |
|
2016-06-28 17:40:43 |
|
2016-04-26 18:48:09 |
|
2014-02-17 10:49:53 |
|
2014-01-19 21:25:52 |
|
2013-05-10 23:49:46 |
|