Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2009-1532 | First vendor Publication | 2009-06-10 |
Vendor | Cve | Last vendor Modification | 2025-01-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Internet Explorer 8 for Windows XP SP2 and SP3; 8 for Server 2003 SP2; 8 for Vista Gold, SP1, and SP2; and 8 for Server 2008 SP2 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code via "malformed row property references" that trigger an access of an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Objects Memory Corruption Vulnerability" or "HTML Object Memory Corruption Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1532 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-8 | Buffer Overflow in an API Call |
CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
CAPEC-10 | Buffer Overflow via Environment Variables |
CAPEC-14 | Client-side Injection-induced Buffer Overflow |
CAPEC-24 | Filter Failure through Buffer Overflow |
CAPEC-42 | MIME Conversion |
CAPEC-44 | Overflow Binary Resource File |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-46 | Overflow Variables and Tags |
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CAPEC-100 | Overflow Buffers |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6244 | |||
Oval ID: | oval:org.mitre.oval:def:6244 | ||
Title: | HTML Objects Memory Corruption Vulnerability | ||
Description: | Microsoft Internet Explorer 8 for Windows XP SP2 and SP3; 8 for Server 2003 SP2; 8 for Vista Gold, SP1, and SP2; and 8 for Server 2008 SP2 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code via "malformed row property references" that trigger an access of an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Objects Memory Corruption Vulnerability" or "HTML Object Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-1532 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 | Product(s): | Microsoft Internet Explorer 8 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2009-06-10 | Name : Cumulative Security Update for Internet Explorer (969897) File : nvt/secpod_ms09-019.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
54951 | Microsoft IE Crafted HTML Malformed Row Property References Memory Corruption |
Snort® IPS/IDS
Date | Description |
---|---|
2017-02-03 | Microsoft Internet Explorer layout object use after free attempt RuleID : 41107 - Revision : 1 - Type : BROWSER-IE |
2014-11-16 | Microsoft Internet Explorer Unexpected method call remote code execution attempt RuleID : 31402 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer event handler memory corruption attempt RuleID : 17566 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer layout object use after free attempt RuleID : 15540 - Revision : 16 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer onreadystatechange memory corruption attempt RuleID : 15538 - Revision : 10 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer invalid object modification exploit attempt RuleID : 15536 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer setCapture heap corruption exploit attempt RuleID : 15535 - Revision : 12 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer XML HttpRequest race condition exploit attempt RuleID : 15534 - Revision : 10 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer Unexpected method call remote code execution attempt RuleID : 15531 - Revision : 10 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer cross-domain navigation cookie stealing attempt RuleID : 15529 - Revision : 9 - Type : BROWSER-IE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-06-10 | Name : Arbitrary code can be executed on the remote host through a web browser. File : smb_nt_ms09-019.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-01-21 21:21:13 |
|
2024-11-28 23:11:06 |
|
2024-11-28 12:18:53 |
|
2024-02-09 09:27:55 |
|
2023-12-07 21:28:05 |
|
2021-07-27 00:24:33 |
|
2021-07-24 01:44:11 |
|
2021-07-24 01:06:05 |
|
2021-07-23 21:25:00 |
|
2020-05-23 00:23:43 |
|
2019-02-26 17:19:31 |
|
2018-10-31 00:19:56 |
|
2018-10-13 00:22:49 |
|
2018-10-11 00:19:36 |
|
2017-09-29 09:24:12 |
|
2016-09-30 01:02:03 |
|
2016-08-31 12:01:47 |
|
2016-06-28 17:40:47 |
|
2016-04-26 18:48:12 |
|
2014-02-17 10:49:54 |
|
2014-01-19 21:25:53 |
|
2013-05-10 23:49:47 |
|