CVE Vulnerabilities

CVE-2012-2557

Published: Sep 21, 2012 | Modified: Oct 12, 2018
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
9.3 HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka cloneNode Use After Free Vulnerability.

Affected Software

Name Vendor Start Version End Version
Internet_explorer Microsoft 6 (including) 6 (including)
Internet_explorer Microsoft 6-beta1 (including) 6-beta1 (including)
Internet_explorer Microsoft 6-sp1 (including) 6-sp1 (including)
Internet_explorer Microsoft 6-sp2 (including) 6-sp2 (including)
Internet_explorer Microsoft 6-sp3 (including) 6-sp3 (including)
Internet_explorer Microsoft 7 (including) 7 (including)
Internet_explorer Microsoft 7-beta1 (including) 7-beta1 (including)
Internet_explorer Microsoft 7-beta2 (including) 7-beta2 (including)
Internet_explorer Microsoft 7-beta3 (including) 7-beta3 (including)
Internet_explorer Microsoft 7-rc1 (including) 7-rc1 (including)
Internet_explorer Microsoft 8 (including) 8 (including)
Internet_explorer Microsoft 8-beta1 (including) 8-beta1 (including)
Internet_explorer Microsoft 8-beta2 (including) 8-beta2 (including)
Internet_explorer Microsoft 8-rc1 (including) 8-rc1 (including)
Internet_explorer Microsoft 9 (including) 9 (including)

References