CVE-2012-4792

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.
References
Link Resource
http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html Broken Link
http://blogs.technet.com/b/srd/archive/2012/12/29/new-vulnerability-affecting-internet-explorer-8-users.aspx Broken Link
http://blogs.technet.com/b/srd/archive/2012/12/31/microsoft-quot-fix-it-quot-available-for-internet-explorer-6-7-and-8.aspx Broken Link
http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/ Third Party Advisory
http://labs.alienvault.com/labs/index.php/2012/just-another-water-hole-campaign-using-an-internet-explorer-0day/ Broken Link
http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html Third Party Advisory VDB Entry
http://technet.microsoft.com/security/advisory/2794220 Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/154201 Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA13-008A.html Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA13-015A.html Third Party Advisory US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-008 Patch Vendor Advisory
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_cbutton_uaf.rb Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16361 Broken Link
http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html Broken Link
http://blogs.technet.com/b/srd/archive/2012/12/29/new-vulnerability-affecting-internet-explorer-8-users.aspx Broken Link
http://blogs.technet.com/b/srd/archive/2012/12/31/microsoft-quot-fix-it-quot-available-for-internet-explorer-6-7-and-8.aspx Broken Link
http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/ Third Party Advisory
http://labs.alienvault.com/labs/index.php/2012/just-another-water-hole-campaign-using-an-internet-explorer-0day/ Broken Link
http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html Third Party Advisory VDB Entry
http://technet.microsoft.com/security/advisory/2794220 Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/154201 Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA13-008A.html Third Party Advisory US Government Resource
http://www.us-cert.gov/cas/techalerts/TA13-015A.html Third Party Advisory US Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-008 Patch Vendor Advisory
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_cbutton_uaf.rb Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16361 Broken Link
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*

Configuration 2 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*

Configuration 3 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:r2:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_server_2008:*:r2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*

History

21 Nov 2024, 01:43

Type Values Removed Values Added
References () http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html - Broken Link () http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html - Broken Link
References () http://blogs.technet.com/b/srd/archive/2012/12/29/new-vulnerability-affecting-internet-explorer-8-users.aspx - Broken Link () http://blogs.technet.com/b/srd/archive/2012/12/29/new-vulnerability-affecting-internet-explorer-8-users.aspx - Broken Link
References () http://blogs.technet.com/b/srd/archive/2012/12/31/microsoft-quot-fix-it-quot-available-for-internet-explorer-6-7-and-8.aspx - Broken Link () http://blogs.technet.com/b/srd/archive/2012/12/31/microsoft-quot-fix-it-quot-available-for-internet-explorer-6-7-and-8.aspx - Broken Link
References () http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/ - Third Party Advisory () http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/ - Third Party Advisory
References () http://labs.alienvault.com/labs/index.php/2012/just-another-water-hole-campaign-using-an-internet-explorer-0day/ - Broken Link () http://labs.alienvault.com/labs/index.php/2012/just-another-water-hole-campaign-using-an-internet-explorer-0day/ - Broken Link
References () http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html - Third Party Advisory, VDB Entry
References () http://technet.microsoft.com/security/advisory/2794220 - Patch, Vendor Advisory () http://technet.microsoft.com/security/advisory/2794220 - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/154201 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/154201 - Third Party Advisory, US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA13-008A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA13-008A.html - Third Party Advisory, US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA13-015A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA13-015A.html - Third Party Advisory, US Government Resource
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-008 - Patch, Vendor Advisory () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-008 - Patch, Vendor Advisory
References () https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_cbutton_uaf.rb - Third Party Advisory () https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_cbutton_uaf.rb - Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16361 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16361 - Broken Link

14 Aug 2024, 15:02

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2008:*:r2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_server_2008:*:r2:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
References () http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html - () http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html - Broken Link
References () http://blogs.technet.com/b/srd/archive/2012/12/29/new-vulnerability-affecting-internet-explorer-8-users.aspx - () http://blogs.technet.com/b/srd/archive/2012/12/29/new-vulnerability-affecting-internet-explorer-8-users.aspx - Broken Link
References () http://blogs.technet.com/b/srd/archive/2012/12/31/microsoft-quot-fix-it-quot-available-for-internet-explorer-6-7-and-8.aspx - () http://blogs.technet.com/b/srd/archive/2012/12/31/microsoft-quot-fix-it-quot-available-for-internet-explorer-6-7-and-8.aspx - Broken Link
References () http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/ - () http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/ - Third Party Advisory
References () http://labs.alienvault.com/labs/index.php/2012/just-another-water-hole-campaign-using-an-internet-explorer-0day/ - () http://labs.alienvault.com/labs/index.php/2012/just-another-water-hole-campaign-using-an-internet-explorer-0day/ - Broken Link
References () http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html - () http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html - Third Party Advisory, VDB Entry
References () http://technet.microsoft.com/security/advisory/2794220 - Vendor Advisory () http://technet.microsoft.com/security/advisory/2794220 - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/154201 - US Government Resource () http://www.kb.cert.org/vuls/id/154201 - Third Party Advisory, US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA13-008A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA13-008A.html - Third Party Advisory, US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA13-015A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA13-015A.html - Third Party Advisory, US Government Resource
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-008 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-008 - Patch, Vendor Advisory
References () https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_cbutton_uaf.rb - () https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_cbutton_uaf.rb - Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16361 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16361 - Broken Link
CWE CWE-399

01 Aug 2024, 13:41

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : 9.3
v3 : unknown
v2 : 9.3
v3 : 8.8

07 Dec 2023, 18:38

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*

Information

Published : 2012-12-30 18:55

Updated : 2024-11-21 01:43


NVD link : CVE-2012-4792

Mitre link : CVE-2012-4792

CVE.ORG link : CVE-2012-4792


JSON object : View

Products Affected

microsoft

  • windows_vista
  • windows_7
  • windows_xp
  • windows_server_2003
  • windows_server_2008
  • internet_explorer
CWE
CWE-416

Use After Free