CVE-2013-2551

Published Mar 11, 2013

Last updated 4 months ago

Overview

Description
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
Source
cve@mitre.org
NVD status
Analyzed

Social media

Hype score
Not currently trending

Risk scores

CVSS 3.1

Type
Primary
Base score
8.8
Impact score
5.9
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
9.3
Impact score
10
Exploitability score
8.6
Vector string
AV:N/AC:M/Au:N/C:C/I:C/A:C

Known exploits

Data from CISA

Vulnerability name
Microsoft Internet Explorer Use-After-Free Vulnerability
Exploit added on
Mar 28, 2022
Exploit action due
Apr 18, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-416

Evaluator

Comment
CWE 416 User-after-free http://cwe.mitre.org/data/definitions/416.html
Impact
-
Solution
-

Configurations