Microsoft Internet Explorer CVE-2013-0091 Use-After-Free Remote Code Execution Vulnerability
BID:58346
Info
Microsoft Internet Explorer CVE-2013-0091 Use-After-Free Remote Code Execution Vulnerability
| Bugtraq ID: | 58346 |
| Class: | Unknown |
| CVE: |
CVE-2013-0091 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 12 2013 12:00AM |
| Updated: | Mar 12 2013 12:00AM |
| Credit: | Jose A Vazquez of Yenteasy Security Research, working with the Exodus Intelligence |
| Vulnerable: |
Microsoft Internet Explorer 8 |
| Not Vulnerable: | |
Discussion
Microsoft Internet Explorer CVE-2013-0091 Use-After-Free Remote Code Execution Vulnerability
Microsoft Internet Explorer is prone to a remote code-execution vulnerability.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer 8 is affected.
Microsoft Internet Explorer is prone to a remote code-execution vulnerability.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer 8 is affected.
Exploit / POC
Microsoft Internet Explorer CVE-2013-0091 Use-After-Free Remote Code Execution Vulnerability
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
Microsoft Internet Explorer CVE-2013-0091 Use-After-Free Remote Code Execution Vulnerability
Solution:
Updates are available. Please see the references or vendor advisory for more information.
Solution:
Updates are available. Please see the references or vendor advisory for more information.