CVE-2012-4969
high-risk
Published 2012-09-18
Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012.
Do I need to act?
!
91.8% chance of exploitation in next 30 days
EPSS score — higher than 8% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (4)
Affected Vendors
References (23)
Third Party Advisory
http://eromang.zataz.com/2012/09/16/zero-day-season-is-really-not-over-yet/
Third Party Advisory
http://www.kb.cert.org/vuls/id/480095
Third Party Advisory
http://www.securitytracker.com/id?1027538
Third Party Advisory
http://www.securityweek.com/new-internet-explorer-zero-day-being-exploited-wild
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA12-255A.html
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA12-262A.html
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA12-265A.html
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3...
Third Party Advisory
http://eromang.zataz.com/2012/09/16/zero-day-season-is-really-not-over-yet/
Third Party Advisory
http://www.kb.cert.org/vuls/id/480095
Third Party Advisory
http://www.securitytracker.com/id?1027538
Third Party Advisory
http://www.securityweek.com/new-internet-explorer-zero-day-being-exploited-wild
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA12-255A.html
Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA12-262A.html
and 3 more references
68
/ 100
high-risk
Severity
24/34 · High
Exploitability
34/34 · Critical
Exposure
10/34 · Low