Vulnerability Details : CVE-2012-4792
Public exploit exists!
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.
Vulnerability category: Memory CorruptionExecute code
Exploit prediction scoring system (EPSS) score for CVE-2012-4792
Probability of exploitation activity in the next 30 days: 91.35%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2012-4792
-
MS13-008 Microsoft Internet Explorer CButton Object Use-After-Free Vulnerability
Disclosure Date: 2012-12-27First seen: 2020-04-26exploit/windows/browser/ie_cbutton_uafThis module exploits a vulnerability found in Microsoft Internet Explorer. A use-after-free condition occurs when a CButton object is freed, but a reference is kept and used again during a page reload, an invalid memory that's controllable is used, and allows arbit
CVSS scores for CVE-2012-4792
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2012-4792
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4792
-
http://www.kb.cert.org/vuls/id/154201
VU#154201 - Microsoft Internet Explorer CButton use-after-free vulnerabilityUS Government Resource
-
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_cbutton_uaf.rb
metasploit-framework/ie_cbutton_uaf.rb at master · rapid7/metasploit-framework · GitHub
-
http://blogs.technet.com/b/srd/archive/2012/12/29/new-vulnerability-affecting-internet-explorer-8-users.aspx
New vulnerability affecting Internet Explorer 8 users – Microsoft Security Response Center
-
http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html
FireEye Blog - Threat Research and Analysis | FireEye
-
http://blogs.technet.com/b/srd/archive/2012/12/31/microsoft-quot-fix-it-quot-available-for-internet-explorer-6-7-and-8.aspx
Microsoft “Fix it” available for Internet Explorer 6, 7, and 8 – Microsoft Security Response Center
-
http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html
Microsoft Internet Explorer CDwnBindInfo Object Use-After-Free ≈ Packet Storm
-
http://technet.microsoft.com/security/advisory/2794220
Microsoft Security Advisory 2794220 | Microsoft DocsVendor Advisory
-
http://www.us-cert.gov/cas/techalerts/TA13-015A.html
Microsoft Releases Update for Internet Explorer Vulnerability CVE-2012-4792 | CISAUS Government Resource
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-008
Microsoft Security Bulletin MS13-008 - Critical | Microsoft Docs
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16361
Repository / Oval Repository
-
http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/
Attack and IE 0day Informations Used Against Council on Foreign Relations
-
http://labs.alienvault.com/labs/index.php/2012/just-another-water-hole-campaign-using-an-internet-explorer-0day/
403 Forbidden
-
http://www.us-cert.gov/cas/techalerts/TA13-008A.html
Microsoft Updates for Multiple Vulnerabilities | CISAUS Government Resource
Products affected by CVE-2012-4792
- cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*