CVE-2009-3671 — Use After Free in Microsoft Internet Explorer
Severity
9.3CRITICALNVD
NVD8.1VulnCheck8.1
EPSS
56.5%
top 1.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 9
Latest updateMay 13
Description
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3674.
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages1 packages
🔴Vulnerability Details
6GHSA▶
GHSA-mqh3-jqp8-83fg: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an obje↗2022-05-13
GHSA▶
GHSA-6xc6-38fw-mpv2: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an obje↗2022-05-02
GHSA▶
GHSA-3w8c-hmvh-m87g: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an obje↗2022-05-02
GHSA▶
GHSA-533f-24pj-cvj8: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an obje↗2022-05-02
GHSA▶
GHSA-589g-vgq7-8xv6: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an obje↗2022-05-02