Vulnerability Name:

CVE-2013-3893 (CCN-87181)

Assigned:2013-09-17
Published:2013-09-17
Updated:2021-05-17
Summary:Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-399
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Microsoft TechNet Blogs, 17 Sep 2013 12:35 PM
CVE-2013-3893: Fix it workaround available

Source: CONFIRM
Type: Exploit
http://blogs.technet.com/b/srd/archive/2013/09/17/cve-2013-3893-fix-it-workaround-available.aspx

Source: CONFIRM
Type: UNKNOWN
http://blogs.technet.com/b/srd/archive/2013/10/08/ms13-080-addresses-two-vulnerabilities-under-limited-targeted-attacks.aspx

Source: MITRE
Type: CNA
CVE-2013-3893

Source: JVN
Type: UNKNOWN
JVN#27443259

Source: JVNDB
Type: UNKNOWN
JVNDB-2013-000093

Source: MISC
Type: UNKNOWN
http://packetstormsecurity.com/files/162585/Microsoft-Internet-Explorer-8-SetMouseCapture-Use-After-Free.html

Source: MISC
Type: Exploit
http://pastebin.com/raw.php?i=Hx1L5gu6

Source: CCN
Type: SA54884
Microsoft Internet Explorer HTML Rendering Engine Use-After-Free Vulnerability

Source: CCN
Type: SECTRACK ID: 1029041
Microsoft Internet Explorer Object Access Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code

Source: CCN
Type: Microsoft Security Advisory (2887505)
Vulnerability in Internet Explorer Could Allow Remote Code Execution

Source: CCN
Type: Microsoft Security Bulletin MS13-080
Cumulative Security Update for Internet Explorer (2879017)

Source: CONFIRM
Type: Vendor Advisory
http://technet.microsoft.com/security/advisory/2887505

Source: CCN
Type: IBM Security Solutions Protection Alert
Microsoft Internet Explorer SetMouseCapture code execution

Source: CCN
Type: OSVDB ID: 97380
Microsoft IE HTML Rendering Engine Unspecified Use-after-free Arbitrary Code Execution

Source: BID
Type: UNKNOWN
62453

Source: CCN
Type: BID-62453
Microsoft Internet Explorer CVE-2013-3893 Memory Corruption Vulnerability

Source: CERT
Type: US Government Resource
TA13-288A

Source: MS
Type: UNKNOWN
MS13-080

Source: XF
Type: UNKNOWN
ie-cve20133893-code-execution(87181)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:18665

Source: CCN
Type: Packet Storm Security [09-30-2013]
Microsoft Internet Explorer SetMouseCapture Use-After-Free

Source: CCN
Type: Packet Storm Security [05-17-2021]
Microsoft Internet Explorer 8 SetMouseCapture Use-After-Free

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [10-02-2013]

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [05-17-2021]

Vulnerable Configuration:Configuration 1:
  • cpe:/a:microsoft:internet_explorer:11:release-preview:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:11:developer-preview:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:10:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:microsoft:internet_explorer:9:-:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:6:-:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:internet_explorer:10:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:18665
    V
    Internet Explorer Memory Corruption Vulnerability (CVE-2013-3893) - MS13-080
    2014-08-18
    BACK
    microsoft internet explorer 11 release-preview
    microsoft internet explorer 11 developer-preview
    microsoft internet explorer 6
    microsoft internet explorer 7
    microsoft internet explorer 8
    microsoft internet explorer 9
    microsoft internet explorer 10
    microsoft internet explorer 9 -
    microsoft internet explorer 6 -
    microsoft internet explorer 7
    microsoft internet explorer 8
    microsoft internet explorer 10 -