Vulnerability Name:

CVE-2008-1442 (CCN-42692)

Assigned:2008-06-10
Published:2008-06-10
Updated:2018-10-12
Summary:Heap-based buffer overflow in the substringData method in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code, related to an unspecified manipulation of a DOM object before a call to this method, aka the "HTML Objects Memory Corruption Vulnerability."
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-1442

Source: CCN
Type: HP Security Bulletin HPSBST02344 SSRT080087 rev.1
Storage Management Appliance (SMA), Microsoft Patch Applicability MS08-030 to MS08-036

Source: HP
Type: Mailing List
HPSBST02344

Source: CCN
Type: SA30575
Internet Explorer "substringData()" Memory Corruption Vulnerability

Source: SECUNIA
Type: Patch, Vendor Advisory
30575

Source: SREASON
Type: Third Party Advisory
3934

Source: CCN
Type: SECTRACK ID: 1020225
Microsoft Internet Explorer Bug in Processing Method Calls Lets Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: Patch
1020225

Source: CCN
Type: ASA-2008-233
MS08-031 Cumulative Security Update for Internet Explorer (950759)

Source: CCN
Type: NORTEL BULLETIN ID: 2008008891, Rev 1
Centrex IP Client Manager (CICM) response to Microsoft June security bulletin

Source: CCN
Type: NORTEL BULLETIN ID: 2008008896, Rev 1
Nortel Response to Microsoft Security Bulletin MS08-031

Source: CCN
Type: Microsoft Security Bulletin MS08-031
Cumulative Security Update for Internet Explorer (950759)

Source: CCN
Type: Microsoft Security Bulletin MS08-045
Cumulative Security Update for Internet Explorer (953838)

Source: CCN
Type: Microsoft Security Bulletin MS08-058
Cumulative Security Update for Internet Explorer (956390)

Source: BUGTRAQ
Type: UNKNOWN
20080610 ZDI-08-039: Microsoft Internet Explorer DOM Ojbect substringData() Heap Overflow Vulnerability

Source: BID
Type: Third Party Advisory, VDB Entry
29556

Source: CCN
Type: BID-29556
Microsoft Internet Explorer HTML Objects 'substringData()' Remote Code Execution Vulnerability

Source: CERT
Type: Third Party Advisory, US Government Resource
TA08-162B

Source: VUPEN
Type: Broken Link
ADV-2008-1778

Source: MISC
Type: Patch, Technical Description, Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-039/

Source: MS
Type: UNKNOWN
MS08-031

Source: XF
Type: UNKNOWN
ie-html-object-code-execution(42692)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:5720

Source: CCN
Type: ZDI-08-039
Microsoft Internet Explorer DOM Object substringData() Heap Overflow Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:7:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:ie:6.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:7.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:5720
    V
    HTML Objects Memory Corruption Vulnerability
    2014-08-18
    BACK
    microsoft internet explorer 6
    microsoft internet explorer 7
    microsoft ie 6.0
    microsoft ie 6.0 sp1
    microsoft ie 7.0