Use-after-free vulnerability in Microsoft Internet Explorer 6 SP1, 6 SP2, and and 7 allows remote attackers to execute arbitrary code by assigning malformed values to certain properties, as demonstrated using the by property of an animateMotion SVG element, aka "Property Memory Corruption Vulnerability."
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 00:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=661 - Broken Link | |
References | () http://marc.info/?l=bugtraq&m=120361015026386&w=2 - Mailing List | |
References | () http://secunia.com/advisories/28903 - Broken Link, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/228569 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/archive/1/488048/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/27666 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1019380 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.us-cert.gov/cas/techalerts/TA08-043C.html - Broken Link, Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2008/0512/references - Broken Link, Vendor Advisory | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-08-006.html - Third Party Advisory, VDB Entry | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010 - Patch, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5396 - Broken Link |
03 Feb 2024, 02:21
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 8.8 |
CWE | CWE-416 | |
CPE | cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_2003_server:-:sp1:*:*:*:*:*:* |
|
References | (MS) https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010 - Patch, Vendor Advisory | |
References | (MISC) http://www.zerodayinitiative.com/advisories/ZDI-08-006.html - Third Party Advisory, VDB Entry | |
References | (VUPEN) http://www.vupen.com/english/advisories/2008/0512/references - Broken Link, Vendor Advisory | |
References | (CERT-VN) http://www.kb.cert.org/vuls/id/228569 - Third Party Advisory, US Government Resource | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/488048/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry | |
References | (IDEFENSE) http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=661 - Broken Link | |
References | (CERT) http://www.us-cert.gov/cas/techalerts/TA08-043C.html - Broken Link, Third Party Advisory, US Government Resource | |
References | (SECTRACK) http://www.securitytracker.com/id?1019380 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/28903 - Broken Link, Vendor Advisory | |
References | (BID) http://www.securityfocus.com/bid/27666 - Broken Link, Third Party Advisory, VDB Entry | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5396 - Broken Link | |
References | (HP) http://marc.info/?l=bugtraq&m=120361015026386&w=2 - Mailing List |
Information
Published : 2008-02-12 23:00
Updated : 2024-11-21 00:41
NVD link : CVE-2008-0077
Mitre link : CVE-2008-0077
CVE.ORG link : CVE-2008-0077
JSON object : View
Products Affected
microsoft
- windows_vista
- windows_xp
- windows_2000
- windows_2003_server
- windows_server_2003
- internet_explorer
CWE
CWE-416
Use After Free