Vulnerabilities > CVE-2012-4787 - Resource Management Errors vulnerability in Microsoft Internet Explorer 10/9

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."

Common Weakness Enumeration (CWE)

Msbulletin

bulletin_idMS12-077
bulletin_url
date2012-12-11T00:00:00
impactRemote Code Execution
knowledgebase_id2761465
knowledgebase_url
severityCritical
titleCumulative Security Update for Internet Explorer

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS12-077.NASL
descriptionThe remote host is missing Internet Explorer (IE) Security Update 2761465. The installed version of IE is affected by vulnerabilities that could allow an attacker to execute arbitrary code on the remote host.
last seen2020-06-01
modified2020-06-02
plugin id63224
published2012-12-11
reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/63224
titleMS12-077: Cumulative Security Update for Internet Explorer (2761465)

Oval

accepted2014-08-18T04:01:31.202-04:00
classvulnerability
contributors
  • nameSecPod Team
    organizationSecPod Technologies
  • namePradeep R B
    organizationSecPod Technologies
  • nameMaria Mikhno
    organizationALTX-SOFT
definition_extensions
  • commentMicrosoft Internet Explorer 9 is installed
    ovaloval:org.mitre.oval:def:11985
  • commentMicrosoft Windows 7 is installed
    ovaloval:org.mitre.oval:def:12541
  • commentMicrosoft Windows Server 2008 R2 x64 Edition is installed
    ovaloval:org.mitre.oval:def:6438
  • commentMicrosoft Windows Vista (32-bit) is installed
    ovaloval:org.mitre.oval:def:1282
  • commentMicrosoft Windows Vista x64 Edition is installed
    ovaloval:org.mitre.oval:def:2041
  • commentMicrosoft Windows Server 2008 (32-bit) is installed
    ovaloval:org.mitre.oval:def:4870
  • commentMicrosoft Windows Server 2008 (64-bit) is installed
    ovaloval:org.mitre.oval:def:5356
  • commentMicrosoft Windows Server 2008 (ia-64) is installed
    ovaloval:org.mitre.oval:def:5667
  • commentMicrosoft Windows 7 (32-bit) is installed
    ovaloval:org.mitre.oval:def:6165
  • commentMicrosoft Windows 7 x64 Edition is installed
    ovaloval:org.mitre.oval:def:5950
  • commentMicrosoft Windows Server 2008 R2 Itanium-Based Edition is installed
    ovaloval:org.mitre.oval:def:5954
  • commentMicrosoft Internet Explorer 10 is installed
    ovaloval:org.mitre.oval:def:15751
  • commentMicrosoft Windows 7 is installed
    ovaloval:org.mitre.oval:def:12541
  • commentMicrosoft Windows Server 2008 R2 x64 Edition is installed
    ovaloval:org.mitre.oval:def:6438
  • commentMicrosoft Windows 7 (32-bit) is installed
    ovaloval:org.mitre.oval:def:6165
  • commentMicrosoft Windows 7 x64 Edition is installed
    ovaloval:org.mitre.oval:def:5950
  • commentMicrosoft Windows Server 2008 R2 Itanium-Based Edition is installed
    ovaloval:org.mitre.oval:def:5954
  • commentMicrosoft Windows 8 is installed
    ovaloval:org.mitre.oval:def:15732
  • commentMicrosoft Windows Server 2012 is installed
    ovaloval:org.mitre.oval:def:16359
descriptionUse-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."
familywindows
idoval:org.mitre.oval:def:16211
statusaccepted
submitted2012-12-12T10:50:10
titleImproper Ref Counting Use After Free Vulnerability - MS12-077
version76

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 56830 CVE(CAN) ID: CVE-2012-4787 Microsoft Internet Explorer是微软公司推出的一款网页浏览器,使用相当广泛。 Microsoft Internet Explorer 6、7、8、9、10在处理恶意HTML内容时,Ref Counting存在错误的内存操作,通过引诱用户浏览恶意网站,未经身份验证的远程攻击者可利用此漏洞以当前用户权限执行任意代码。 0 Microsoft Internet Explorer 9.x Microsoft Internet Explorer 8.x Microsoft Internet Explorer 7.x Microsoft Internet Explorer 6.x Microsoft Internet Explorer 10.x 临时解决方法: * 将“互联网”和“内联网”安全区域设置为“高”,以阻止ActiveX控件和AS。 * 配置IE,在运行AS前提示,或禁用AS。 厂商补丁: Microsoft --------- Microsoft已经为此发布了一个安全公告(MS12-077)以及相应补丁: MS12-077:Cumulative Security Update for Internet Explorer (2761465) 链接:http://www.microsoft.com/technet/security/bulletin/MS12-077.mspx 补丁下载:http://update.microsoft.com/
idSSV:60506
last seen2017-11-19
modified2012-12-13
published2012-12-13
reporterRoot
titleMicrosoft Internet Explorer Ref Counting释放后重用远程代码执行漏洞(MS12-077)