⚠ Actively exploited
Added to CISA KEV on 2022-06-08. Federal agencies required to patch by 2022-06-22. Required action: Apply updates per vendor instructions..

CVE-2012-4969Use After Free in Microsoft Internet Explorer

CWE-416Use After Free14 documents11 sources
Severity
8.1HIGHNVD
EPSS
91.8%
top 0.31%
CISA KEV
KEV
Added 2022-06-08
Due 2022-06-22
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedSep 18
KEV addedJun 8
KEV dueJun 22
CISA Required Action: Apply updates per vendor instructions.

Description

Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages1 packages

NVDmicrosoft/internet_explorer4 versions+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-xvh2-pw6x-f8hh: Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml2022-05-17
VulnCheck
Microsoft Internet Explorer Use-After-Free Vulnerability2012

💥Exploits & PoCs

2
Exploit-DB
Microsoft Internet Explorer - execCommand Use-After-Free (MS12-063) (Metasploit)2012-10-10
Metasploit
MS12-063 Microsoft Internet Explorer execCommand Use-After-Free Vulnerability

🔍Detection Rules

1
Suricata
ET WEB_CLIENT Internet Explorer execCommand function Use after free Vulnerability 0day Metasploit 22015-01-06

📋Vendor Advisories

1
CISA
Microsoft Internet Explorer Use-After-Free Vulnerability2022-06-08

🕵️Threat Intelligence

6
Unit42
Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists2016-01-24
Unit42
Scarlet Mimic: Years-Long Espionage Campaign Targets Minority Activists2016-01-24
Krebs
In a Zero-Day World, It’s Active Attacks that Matter – Krebs on Security2012-10-01
Krebs
In a Zero-Day World, It’s Active Attacks that Matter2012-10-01
Zscaler
Zscaler found Multiple Security Vulnerabilities | 09-18-2012

📄Research Papers

1
CTF
17. Using the Metasploit-Framework / Using the Metasploit-Framework
CVE-2012-4969 — Use After Free in Microsoft | cvebase