CVE-2009-3671Use After Free in Microsoft Internet Explorer

Severity
9.3CRITICALNVD
NVD8.1VulnCheck8.1
EPSS
56.5%
top 1.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 9
Latest updateMay 13

Description

Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3674.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages1 packages

NVDmicrosoft/internet_explorer5 versions+4

🔴Vulnerability Details

6
GHSA
GHSA-mqh3-jqp8-83fg: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an obje2022-05-13
GHSA
GHSA-6xc6-38fw-mpv2: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an obje2022-05-02
GHSA
GHSA-3w8c-hmvh-m87g: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an obje2022-05-02
GHSA
GHSA-533f-24pj-cvj8: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an obje2022-05-02
GHSA
GHSA-589g-vgq7-8xv6: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an obje2022-05-02
CVE-2009-3671 — Use After Free in Microsoft | cvebase