Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2013-3897 | First vendor Publication | 2013-10-09 |
Vendor | Cve | Last vendor Modification | 2025-02-10 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 8.8 | ||
Base Score | 8.8 | Environmental Score | 8.8 |
impact SubScore | 5.9 | Temporal Score | 8.8 |
Exploitabality Sub Score | 2.8 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | Required |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3897 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-416 | Use After Free |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18989 | |||
Oval ID: | oval:org.mitre.oval:def:18989 | ||
Title: | Internet Explorer Memory Corruption Vulnerability (CVE-2013-3897) - MS13-080 | ||
Description: | Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-3897 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Vista Microsoft Windows XP | Product(s): | Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Microsoft Internet Explorer 9 Microsoft Internet Explorer 10 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Internet Explorer CDisplayPointer Object onpropertychange Use-After-Free | More info here |
ExploitDB Exploits
id | Description |
---|---|
2013-10-15 | MS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2013-10-10 | IAVM : 2013-A-0188 - Cumulative Security Update for Microsoft Internet Explorer Severity : Category I - VMSKEY : V0040759 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-04-11 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 49375 - Revision : 1 - Type : BROWSER-IE |
2019-04-11 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 49374 - Revision : 1 - Type : BROWSER-IE |
2016-03-24 | Microsoft Internet Explorer swapNode memory corruption attempt RuleID : 37837 - Revision : 2 - Type : BROWSER-IE |
2016-03-24 | Microsoft Internet Explorer swapNode memory corruption attempt RuleID : 37836 - Revision : 2 - Type : BROWSER-IE |
2015-03-31 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 33606 - Revision : 3 - Type : BROWSER-IE |
2015-03-31 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 33605 - Revision : 3 - Type : BROWSER-IE |
2014-05-01 | Microsoft Internet Explorer HtmlLayout SmartObject use after free attempt RuleID : 30289 - Revision : 3 - Type : BROWSER-IE |
2014-04-10 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 30105 - Revision : 3 - Type : BROWSER-IE |
2014-04-10 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 30104 - Revision : 3 - Type : BROWSER-IE |
2014-04-10 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 30103 - Revision : 3 - Type : BROWSER-IE |
2014-04-10 | Microsoft Internet Explorer CAnchorElement use after free attempt RuleID : 30102 - Revision : 3 - Type : BROWSER-IE |
2014-02-08 | potential math library debugging RuleID : 29213 - Revision : 5 - Type : INDICATOR-OBFUSCATION |
2014-01-10 | Microsoft Internet Explorer swapNode memory corruption attempt RuleID : 28208 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer swapNode memory corruption attempt RuleID : 28207 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer deleted object memory corruption attempt RuleID : 28204 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer HtmlLayout SmartObject use after free attempt RuleID : 28163 - Revision : 4 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer CElement use after free attempt RuleID : 28160 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer CLayoutBlock use after free attempt RuleID : 28159 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer CLayoutBlock use after free attempt RuleID : 28158 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer STextBlockPosition use after free attempt RuleID : 28151 - Revision : 3 - Type : BROWSER-IE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-10-09 | Name : The remote host is affected by multiple code execution vulnerabilities. File : smb_nt_ms13-080.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-02-11 17:21:36 |
|
2024-12-19 21:21:25 |
|
2024-11-28 12:36:04 |
|
2024-07-16 21:27:56 |
|
2021-05-04 12:27:03 |
|
2021-04-22 01:32:45 |
|
2020-05-23 13:17:03 |
|
2020-05-23 00:37:49 |
|
2018-10-13 05:18:41 |
|
2017-09-19 09:26:14 |
|
2014-02-17 11:21:31 |
|
2014-02-08 21:20:15 |
|
2014-01-19 21:29:33 |
|
2014-01-03 17:19:04 |
|
2013-12-20 13:19:34 |
|
2013-11-11 12:40:42 |
|
2013-11-04 21:28:19 |
|
2013-10-11 21:21:45 |
|
2013-10-11 13:26:59 |
|
2013-10-10 00:19:57 |
|
2013-10-09 21:21:21 |
|