9.3

CVE-2012-1876

Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.

Data is provided by the National Vulnerability Database (NVD)
MicrosoftInternet Explorer Version6
   MicrosoftWindows 2003 Server Updatesp2
   MicrosoftWindows 2003 Server Updatesp2 Editionitanium
   MicrosoftWindows Server 2003 Updatesp2
   MicrosoftWindows Xp Updatesp3
   MicrosoftWindows Xp Version- Updatesp2 Editionx64
MicrosoftInternet Explorer Version7
   MicrosoftWindows 2003 Server Updatesp2
   MicrosoftWindows 2003 Server Updatesp2 Editionitanium
   MicrosoftWindows Server 2003 Updatesp2
   MicrosoftWindows Server 2008 Updatesp2 Editionx64
   MicrosoftWindows Server 2008 Updatesp2 Editionx86
   MicrosoftWindows Server 2008 Version- Updatesp2 Editionitanium
   MicrosoftWindows Vista Updatesp2
   MicrosoftWindows Vista Version- Updatesp2
   MicrosoftWindows Xp Updatesp3
   MicrosoftWindows Xp Version- Updatesp2 Editionx64
MicrosoftInternet Explorer Version8
   MicrosoftWindows 7 Editionx64
   MicrosoftWindows 7 Editionx86
   MicrosoftWindows 7 Updatesp1 Editionx86
   MicrosoftWindows 7 Version-
   MicrosoftWindows 7 Version- Updatesp1 Editionx86
   MicrosoftWindows Server 2003 Updatesp2
   MicrosoftWindows Server 2008 Updatesp2 Editionitanium
   MicrosoftWindows Server 2008 Updatesp2 Editionx64
   MicrosoftWindows Server 2008 Updatesp2 Editionx86
   MicrosoftWindows Server 2008 Version- Updatesp2 Editionitanium
   MicrosoftWindows Server 2008 Versionr2 Editionitanium
   MicrosoftWindows Server 2008 Versionr2 Editionx64
   MicrosoftWindows Vista Updatesp2
   MicrosoftWindows Xp Updatesp3
   MicrosoftWindows Xp Version- Updatesp2 Editionx64
MicrosoftInternet Explorer Version9
   MicrosoftWindows 7 Editionx64
   MicrosoftWindows 7 Editionx86
   MicrosoftWindows 7 Updatesp1 Editionx86
   MicrosoftWindows 7 Version-
   MicrosoftWindows 7 Version- Updatesp1 Editionx86
   MicrosoftWindows Server 2003 Updatesp2
   MicrosoftWindows Server 2008 Updatesp2 Editionitanium
   MicrosoftWindows Server 2008 Updatesp2 Editionx64
   MicrosoftWindows Server 2008 Updatesp2 Editionx86
   MicrosoftWindows Server 2008 Version- Updatesp2 Editionitanium
   MicrosoftWindows Server 2008 Versionr2 Editionitanium
   MicrosoftWindows Server 2008 Versionr2 Editionx64
   MicrosoftWindows Vista Updatesp2
   MicrosoftWindows Xp Updatesp3
   MicrosoftWindows Xp Version- Updatesp2 Editionx64
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 86.12% 0.994
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.