CVE Vulnerabilities

CVE-2012-2557

Published: Sep 21, 2012 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
9.3 HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka cloneNode Use After Free Vulnerability.

Affected Software

NameVendorStart VersionEnd Version
Internet_explorerMicrosoft6 (including)6 (including)
Internet_explorerMicrosoft6-beta1 (including)6-beta1 (including)
Internet_explorerMicrosoft6-sp1 (including)6-sp1 (including)
Internet_explorerMicrosoft6-sp2 (including)6-sp2 (including)
Internet_explorerMicrosoft6-sp3 (including)6-sp3 (including)
Internet_explorerMicrosoft7 (including)7 (including)
Internet_explorerMicrosoft7-beta1 (including)7-beta1 (including)
Internet_explorerMicrosoft7-beta2 (including)7-beta2 (including)
Internet_explorerMicrosoft7-beta3 (including)7-beta3 (including)
Internet_explorerMicrosoft7-rc1 (including)7-rc1 (including)
Internet_explorerMicrosoft8 (including)8 (including)
Internet_explorerMicrosoft8-beta1 (including)8-beta1 (including)
Internet_explorerMicrosoft8-beta2 (including)8-beta2 (including)
Internet_explorerMicrosoft8-rc1 (including)8-rc1 (including)
Internet_explorerMicrosoft9 (including)9 (including)

References