Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2013-1347 | First vendor Publication | 2013-05-05 |
Vendor | Cve | Last vendor Modification | 2025-02-04 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 8.8 | ||
Base Score | 8.8 | Environmental Score | 8.8 |
impact SubScore | 5.9 | Temporal Score | 8.8 |
Exploitabality Sub Score | 2.8 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | Required |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1347 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-416 | Use After Free |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:16727 | |||
Oval ID: | oval:org.mitre.oval:def:16727 | ||
Title: | Internet Explorer Use After Free Vulnerability - MS13-038 | ||
Description: | Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-1347 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP Microsoft Windows 7 | Product(s): | Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
SAINT Exploits
Description | Link |
---|---|
Internet Explorer CGenericElement Object Use-after-free Vulnerability | More info here |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Private exploit kit outbound traffic RuleID : 27144-community - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Private exploit kit outbound traffic RuleID : 27144 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Private exploit kit landing page RuleID : 27143 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Private exploit kit landing page RuleID : 27142 - Revision : 3 - Type : EXPLOIT-KIT |
2014-01-10 | Private exploit kit landing page RuleID : 27141 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Private exploit kit numerically named exe file dowload RuleID : 27140 - Revision : 4 - Type : EXPLOIT-KIT |
2014-01-10 | Microsoft Internet Explorer null object access attempt RuleID : 26668 - Revision : 3 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer ANIMATECOLOR SMIL access attempt RuleID : 26666 - Revision : 5 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer null object access attempt RuleID : 26572 - Revision : 5 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer null object access attempt RuleID : 26571 - Revision : 3 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer null object access attempt RuleID : 26570 - Revision : 5 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer null object access attempt RuleID : 26569 - Revision : 4 - Type : BROWSER-IE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-05-15 | Name : The remote host is affected by a code execution vulnerability. File : smb_nt_ms13-038.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-02-05 00:21:47 |
|
2024-12-20 09:20:54 |
|
2024-11-28 12:33:53 |
|
2024-07-16 21:27:56 |
|
2023-12-07 21:27:59 |
|
2020-09-28 17:22:46 |
|
2020-05-23 13:17:02 |
|
2020-05-23 00:36:25 |
|
2019-05-09 12:05:13 |
|
2019-02-26 17:19:39 |
|
2018-10-13 05:18:39 |
|
2017-09-19 09:25:53 |
|
2016-10-19 21:22:32 |
|
2016-06-28 22:17:45 |
|
2014-02-17 11:17:31 |
|
2014-01-19 21:29:14 |
|
2013-12-31 13:19:15 |
|
2013-12-13 13:19:18 |
|
2013-11-04 21:26:10 |
|
2013-07-05 10:07:24 |
|
2013-05-16 17:03:12 |
|
2013-05-11 05:18:45 |
|
2013-05-10 22:29:31 |
|
2013-05-07 21:20:55 |
|
2013-05-06 17:19:57 |
|
2013-05-05 17:19:40 |
|