Vulnerabilities > CVE-2011-1345 - Unspecified vulnerability in Microsoft Internet Explorer 8
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, as demonstrated by Stephen Fewer as the first of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011, aka "Object Management Memory Corruption Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
OS | 1 |
Msbulletin
bulletin_id | MS11-018 |
bulletin_url | |
date | 2011-04-12T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 2497640 |
knowledgebase_url | |
severity | Critical |
title | Cumulative Security Update for Internet Explorer |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS11-018.NASL |
description | The remote host is missing Internet Explorer (IE) Security Update 2497640. The installed version of IE is affected by several vulnerabilities that may allow an attacker to execute arbitrary code on the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 53375 |
published | 2011-04-13 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/53375 |
title | MS11-018: Cumulative Security Update for Internet Explorer (2497640) |
Oval
accepted | 2014-08-18T04:00:21.845-04:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
description | Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, as demonstrated by Stephen Fewer as the first of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011, aka "Object Management Memory Corruption Vulnerability." | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
family | windows | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:12228 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
submitted | 2011-04-12T13:00:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
title | Object Management Memory Corruption Vulnerability | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
version | 79 |
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 46821 CVE ID: CVE-2011-1345,CVE-2011-1346,CVE-2011-1347 Internet Explorer,简称IE,是微软公司推出的一款网页浏览器。Internet Explorer,简称IE或MSIE,是微软公司推出的一款网页浏览器。 IE在实现上存在多个远程代码执行漏洞,远程攻击者可利用此漏洞在应用程序中执行任意代码,造成拒绝服务。 在Pwn2Own 2011竞赛中,Metasploit开发者Fewer用两个IE中的零日bug执行了代码,然后链接到第三个漏洞跳出了IE保护模式沙盒。DEP(数据执行保护)和ASLR(地址空间布局随机化)两个保护机制。 Microsoft Internet Explorer 8.x 厂商补丁: Microsoft --------- 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://www.microsoft.com/windows/ie/default.asp |
id | SSV:20373 |
last seen | 2017-11-19 |
modified | 2011-03-18 |
published | 2011-03-18 |
reporter | Root |
title | Microsoft IE多个远程代码执行漏洞 |
References
- http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011
- http://twitter.com/aaronportnoy/statuses/45642180118855680
- http://twitter.com/msftsecresponse/statuses/45646985998516224
- http://www.computerworld.com/s/article/9214002/Safari_IE_hacked_first_at_Pwn2Own
- http://www.securityfocus.com/bid/46821
- http://www.securitytracker.com/id?1025327
- http://www.us-cert.gov/cas/techalerts/TA11-102A.html
- http://www.zdnet.com/blog/security/pwn2own-2011-ie8-on-windows-7-hijacked-with-3-vulnerabilities/8367
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-018
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66062
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12228
- https://threatpost.com/en_us/blogs/pwn2own-winner-stephen-fewer-031011
- http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011
- https://threatpost.com/en_us/blogs/pwn2own-winner-stephen-fewer-031011
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12228
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66062
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-018
- http://www.zdnet.com/blog/security/pwn2own-2011-ie8-on-windows-7-hijacked-with-3-vulnerabilities/8367
- http://www.us-cert.gov/cas/techalerts/TA11-102A.html
- http://www.securitytracker.com/id?1025327
- http://www.securityfocus.com/bid/46821
- http://www.computerworld.com/s/article/9214002/Safari_IE_hacked_first_at_Pwn2Own
- http://twitter.com/msftsecresponse/statuses/45646985998516224
- http://twitter.com/aaronportnoy/statuses/45642180118855680