⚠ Actively exploited
Added to CISA KEV on 2022-03-03. Federal agencies required to patch by 2022-03-24. Required action: Apply updates per vendor instructions..

CVE-2013-1347Use After Free in Microsoft Internet Explorer

Severity
8.8HIGHNVD
EPSS
87.7%
top 0.53%
CISA KEV
KEV
Added 2022-03-03
Due 2022-03-24
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMay 5
KEV addedMar 3
KEV dueMar 24
Latest updateFeb 12
CISA Required Action: Apply updates per vendor instructions.

Description

Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages1 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-4j4f-7rwg-p4q7: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an obje2022-05-13
Kernel
HID: validate HID report id size2013-08-28
VulnCheck
Microsoft Internet Explorer Remote Code Execution Vulnerability2013

💥Exploits & PoCs

2
Exploit-DB
Microsoft Internet Explorer - CGenericElement Object Use-After-Free (Metasploit)2013-05-07
Metasploit
MS13-038 Microsoft Internet Explorer CGenericElement Object Use-After-Free Vulnerability

🔍Detection Rules

1
Suricata
ET EXPLOIT_KIT DRIVEBY Sednit EK IE Exploit CVE-2013-1347 M12014-10-09

📋Vendor Advisories

1
CISA
Microsoft Internet Explorer Remote Code Execution Vulnerability2022-03-03

🕵️Threat Intelligence

13
Qualys
US-CERT: Top 30 Vulnerabilities | Qualys2015-05-01
Qualys
US-CERT: Top 30 Vulnerabilities | Qualys2015-05-01
Talos
Continued analysis of the LightsOut Exploit Kit2014-05-02
Talos
Continued analysis of the LightsOut Exploit Kit2014-05-02
Talos
Microsoft Update Tuesday: Update for IE8 0-day and More2013-05-14

📄Research Papers

1
arXiv
Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures2025-02-12
CVE-2013-1347 — Use After Free in Microsoft | cvebase