ID CVE-2012-2546
Summary Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Event Listener Use After Free Vulnerability."
References
Vulnerable Configurations
  • Microsoft Internet Explorer 9
    cpe:2.3:a:microsoft:internet_explorer:9
  • cpe:2.3:a:microsoft:internet_explorer:9:beta1
    cpe:2.3:a:microsoft:internet_explorer:9:beta1
  • cpe:2.3:a:microsoft:internet_explorer:9:rc1
    cpe:2.3:a:microsoft:internet_explorer:9:rc1
CVSS
Base: 9.3 (as of 24-09-2012 - 07:28)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
msbulletin via4
bulletin_id MS12-063
bulletin_url
date 2012-09-21T00:00:00
impact Remote Code Execution
knowledgebase_id 2744842
knowledgebase_url
severity Critical
title Cumulative Security Update for Internet Explorer
nessus via4
NASL family Windows : Microsoft Bulletins
NASL id SMB_NT_MS12-063.NASL
description The remote host is missing Internet Explorer (IE) Security Update 2744842. The installed version of IE is affected by vulnerabilities that could allow an attacker to execute arbitrary code on the remote host.
last seen 2019-02-21
modified 2018-11-15
plugin id 62223
published 2012-09-21
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=62223
title MS12-063: Cumulative Security Update for Internet Explorer (2744842)
oval via4
accepted 2014-08-18T04:01:22.105-04:00
class vulnerability
contributors
  • name SecPod Team
    organization SecPod Technologies
  • name Maria Mikhno
    organization ALTX-SOFT
definition_extensions
  • comment Microsoft Internet Explorer 9 is installed
    oval oval:org.mitre.oval:def:11985
  • comment Microsoft Windows 7 (32-bit) is installed
    oval oval:org.mitre.oval:def:6165
  • comment Microsoft Windows 7 x64 Edition is installed
    oval oval:org.mitre.oval:def:5950
  • comment Microsoft Windows Server 2008 R2 x64 Edition is installed
    oval oval:org.mitre.oval:def:6438
  • comment Microsoft Windows Server 2008 (32-bit) is installed
    oval oval:org.mitre.oval:def:4870
  • comment Microsoft Windows Server 2008 (64-bit) is installed
    oval oval:org.mitre.oval:def:5356
  • comment Microsoft Windows Vista (32-bit) is installed
    oval oval:org.mitre.oval:def:1282
  • comment Microsoft Windows Vista x64 Edition is installed
    oval oval:org.mitre.oval:def:2041
  • comment Microsoft Windows 7 is installed
    oval oval:org.mitre.oval:def:12541
description Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Event Listener Use After Free Vulnerability."
family windows
id oval:org.mitre.oval:def:15652
status accepted
submitted 2012-09-22T12:54:21
title Event Listener Use After Free Vulnerability - MS12-063
version 71
refmap via4
bid 55645
cert TA12-255A
ms MS12-063
sectrack 1027555
xf ms-ie-eventlistener-code-exec(78757)
Last major update 02-11-2013 - 23:24
Published 21-09-2012 - 17:55
Last modified 12-10-2018 - 18:03
Back to Top