ID CVE-2013-0025
Summary Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer SLayoutRun Use After Free Vulnerability."
References
Vulnerable Configurations
  • Microsoft Internet Explorer 8
    cpe:2.3:a:microsoft:internet_explorer:8
CVSS
Base: 9.3 (as of 03-11-2016 - 14:25)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
  • description MS13-009 Microsoft Internet Explorer SLayoutRun Use-After-Free. CVE-2013-0025. Remote exploit for windows platform
    id EDB-ID:24538
    last seen 2016-02-02
    modified 2013-02-23
    published 2013-02-23
    reporter metasploit
    source https://www.exploit-db.com/download/24538/
    title Microsoft Internet Explorer - SLayoutRun Use-After-Free MS13-009
  • description Microsoft Internet Explorer SLayoutRun Use-After-Free (MS13-009). CVE-2013-0025. Remote exploit for windows platform
    id EDB-ID:24495
    last seen 2016-02-02
    modified 2013-02-14
    published 2013-02-14
    reporter Scott Bell
    source https://www.exploit-db.com/download/24495/
    title Microsoft Internet Explorer SLayoutRun Use-After-Free MS13-009
metasploit via4
description This module exploits a use-after-free vulnerability in Microsoft Internet Explorer where a CParaElement node is released but a reference is still kept in CDoc. This memory is reused when a CDoc relayout is performed.
id MSF:EXPLOIT/WINDOWS/BROWSER/MS13_009_IE_SLAYOUTRUN_UAF
last seen 2019-03-24
modified 2017-10-05
published 2013-02-21
reliability Average
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ms13_009_ie_slayoutrun_uaf.rb
title MS13-009 Microsoft Internet Explorer SLayoutRun Use-After-Free
msbulletin via4
bulletin_id MS13-009
bulletin_url
date 2013-02-12T00:00:00
impact Remote Code Execution
knowledgebase_id 2792100
knowledgebase_url
severity Critical
title Cumulative Security Update for Internet Explorer
nessus via4
NASL family Windows : Microsoft Bulletins
NASL id SMB_NT_MS13-009.NASL
description The remote host is missing Internet Explorer (IE) Security Update 2792100. The installed version of IE is affected by multiple vulnerabilities that could allow an attacker to execute arbitrary code on the remote host.
last seen 2019-02-21
modified 2018-11-15
plugin id 64570
published 2013-02-12
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=64570
title MS13-009: Security Update for Internet Explorer (2792100)
oval via4
accepted 2014-08-18T04:01:32.669-04:00
class vulnerability
contributors
  • name SecPod Team
    organization SecPod Technologies
  • name Maria Mikhno
    organization ALTX-SOFT
definition_extensions
  • comment Microsoft Internet Explorer 8 is installed
    oval oval:org.mitre.oval:def:6210
  • comment Microsoft Windows XP (32-bit) is installed
    oval oval:org.mitre.oval:def:1353
  • comment Microsoft Windows XP x64 is installed
    oval oval:org.mitre.oval:def:15247
  • comment Microsoft Windows Server 2003 (32-bit) is installed
    oval oval:org.mitre.oval:def:1870
  • comment Microsoft Windows Server 2003 (x64) is installed
    oval oval:org.mitre.oval:def:730
  • comment Microsoft Windows Vista (32-bit) is installed
    oval oval:org.mitre.oval:def:1282
  • comment Microsoft Windows Vista x64 Edition is installed
    oval oval:org.mitre.oval:def:2041
  • comment Microsoft Windows Server 2008 (32-bit) is installed
    oval oval:org.mitre.oval:def:4870
  • comment Microsoft Windows Server 2008 (64-bit) is installed
    oval oval:org.mitre.oval:def:5356
  • comment Microsoft Windows 7 (32-bit) is installed
    oval oval:org.mitre.oval:def:6165
  • comment Microsoft Windows 7 x64 Edition is installed
    oval oval:org.mitre.oval:def:5950
  • comment Microsoft Windows Server 2008 R2 is installed
    oval oval:org.mitre.oval:def:12754
  • comment Microsoft Windows Server 2008 R2 Itanium-Based Edition is installed
    oval oval:org.mitre.oval:def:5954
description Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer SLayoutRun Use After Free Vulnerability."
family windows
id oval:org.mitre.oval:def:16294
status accepted
submitted 2013-02-15T10:36:24
title Internet Explorer SLayoutRun use after free vulnerability - MS13-009
version 73
packetstorm via4
data source https://packetstormsecurity.com/files/download/120522/ms13_009_ie_slayoutrun_uaf.rb.txt
id PACKETSTORM:120522
last seen 2016-12-05
published 2013-02-23
reporter sgb
source https://packetstormsecurity.com/files/120522/MS13-009-Microsoft-Internet-Explorer-SLayoutRun-Use-After-Free.html
title MS13-009 Microsoft Internet Explorer SLayoutRun Use-After-Free
refmap via4
cert TA13-043B
ms MS13-009
saint via4
bid 57830
description Internet Explorer SLayoutRun CParaElement Node Use After Free
id win_patch_ie_v8
osvdb 90122
title ie_slayoutrun_cparaelement
type client
Last major update 03-11-2016 - 15:20
Published 13-02-2013 - 07:04
Last modified 12-10-2018 - 18:03
Back to Top