CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
EPSS
Percentile
97.7%
Microsoft Internet Explorer 8 is susceptible to a use-after-free vulnerability in the mshtml.dll
library.
The use-after-free vulnerability is triggered when handling circular memory references. Full details of the crash can be found at Michal Zalewski’s website. Additional details about the fuzzer used to find this vulnerability can be found at Michal Zalewski’s blog.
An attacker can cause the browser to crash and may be able to execute arbitrary code as the user.
We are currently unaware of a practical solution to this problem.
Internet Explorer users should take advantage of the mitigations provided in Microsoft’s Enhanced Mitigation Experience Toolkit.
427980
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: January 06, 2011
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was reported to the public by Michal Zalewski.
This document was written by Jared Allar.
CVE IDs: | CVE-2011-0346 |
---|---|
Severity Metric: | 1.11 Date Public: |
blogs.technet.com/b/srd/archive/2010/09/02/enhanced-mitigation-experience-toolkit-emet-v2-0-0.aspx
lcamtuf.blogspot.com/2011/01/announcing-crossfuzz-potential-0-day-in.html
lcamtuf.coredump.cx/cross_fuzz/msie_crash.txt
msdn.microsoft.com/en-us/library/dd361842%28v=vs.85%29.aspx
seclists.org/fulldisclosure/2011/Jan/1