2013-09-10 This security update resolves ten privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Vulnerabilities addressed in this bulletin:
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3201
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3202
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3203
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3204
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3205
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3206
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3207
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3208
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3209
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3845

Bulletin details at Microsoft.com

Related CVE Entries

Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3203, CVE-2013-3206, CVE-2013-3207, and CVE-2013-3209.
Max CVSS
9.3
EPSS Score
86.09%
Published
2013-09-11
Updated
2018-10-12
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
86.09%
Published
2013-09-11
Updated
2018-10-12
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3201, CVE-2013-3206, CVE-2013-3207, and CVE-2013-3209.
Max CVSS
9.3
EPSS Score
86.09%
Published
2013-09-11
Updated
2018-10-12
Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
81.61%
Published
2013-09-11
Updated
2018-10-12

CVE-2013-3205

Public exploit
Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
97.13%
Published
2013-09-11
Updated
2018-10-12
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3201, CVE-2013-3203, CVE-2013-3207, and CVE-2013-3209.
Max CVSS
9.3
EPSS Score
86.09%
Published
2013-09-11
Updated
2018-10-12
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3201, CVE-2013-3203, CVE-2013-3206, and CVE-2013-3209.
Max CVSS
9.3
EPSS Score
86.09%
Published
2013-09-11
Updated
2018-10-12
Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
86.09%
Published
2013-09-11
Updated
2018-10-12
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3201, CVE-2013-3203, CVE-2013-3206, and CVE-2013-3207.
Max CVSS
9.3
EPSS Score
86.09%
Published
2013-09-11
Updated
2018-10-12
Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
86.09%
Published
2013-09-11
Updated
2018-10-12
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!