MS13-080 Cumulative Security Update for Internet Explorer
2013-10-08 This security update resolves one publicly disclosed vulnerability and eight privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Vulnerabilities addressed in this bulletin:
Bulletin details at Microsoft.com
Vulnerabilities addressed in this bulletin:
- Internet Explorer Memory Corruption Vulnerability
- Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3872 - Internet Explorer Memory Corruption Vulnerability
- Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3873 - Internet Explorer Memory Corruption Vulnerability
- Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3874 - Internet Explorer Memory Corruption Vulnerability
- Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3875 - Internet Explorer Memory Corruption Vulnerability
- Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3882 - Internet Explorer Memory Corruption Vulnerability
- Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3885 - Internet Explorer Memory Corruption Vulnerability
- Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3886 - Internet Explorer Memory Corruption Vulnerability
- Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3893 - Internet Explorer Memory Corruption Vulnerability
- Remote code execution vulnerabilities exist when Internet Explorer improperly accesses an object in memory. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2013-3897
Bulletin details at Microsoft.com
Related CVE Entries
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
82.70%
Published
2013-10-09
Updated
2018-10-12
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3873, CVE-2013-3882, and CVE-2013-3885.
Max CVSS
9.3
EPSS Score
84.22%
Published
2013-10-09
Updated
2018-10-12
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3882, and CVE-2013-3885.
Max CVSS
9.3
EPSS Score
91.83%
Published
2013-10-09
Updated
2018-10-12
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
91.83%
Published
2013-10-09
Updated
2018-10-12
Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
91.18%
Published
2013-10-09
Updated
2018-10-12
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3885.
Max CVSS
9.3
EPSS Score
91.18%
Published
2013-10-09
Updated
2018-10-12
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3882.
Max CVSS
9.3
EPSS Score
91.18%
Published
2013-10-09
Updated
2018-10-12
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
91.18%
Published
2013-10-09
Updated
2018-10-12
CVE-2013-3897
Known exploited
Public exploit
Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploited in the wild in September and October 2013, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
96.50%
Published
2013-10-09
Updated
2018-10-12
CISA KEV Added
2022-03-03
CVE-2013-3893
Public exploit
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
Max CVSS
9.3
EPSS Score
96.25%
Published
2013-09-18
Updated
2021-05-17