9.3
CVSSv2

CVE-2013-3893

Published: 18/09/2013 Updated: 17/05/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 937
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote malicious users to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft internet explorer 11

microsoft internet explorer 6

microsoft internet explorer 7

microsoft internet explorer 8

microsoft internet explorer 9

microsoft internet explorer 10

Exploits

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking i ...
Microsoft Internet Explorer version 8 SetMouseCapture use-after-free exploit ...
This Metasploit module exploits a vulnerability found in Microsoft Internet Explorer It was originally found being exploited in the wild targeting Japanese and Korean IE8 users on Windows XP, around the same time frame as CVE-2013-3893, except this was kept out of the public eye by multiple research companies and the vendor until the October patch ...

Github Repositories

About This document serves as a list of resources, and other things that aid in malware analysis / dev and exploit dev, which will be updated frequently Feel free to contribute resources Courses Paid courses/certificates OSED eCXD SLAE x86 OSEE eCMAP Sektor 7 Red Team Operator Zero2Automated: Ultimate Malware Reverse Engineering CREST Certified Malware Reverse Engineer SANS FO

DEPRECATED Going forwards, this repo won't be updated The list is instead being maintained on my blog (reversingblog) About This document serves as a list of resources, and other things that aid in malware analysis / dev and exploit dev, which will be updated frequently Feel free to contribute resources Courses Paid courses/certificates OSED eCXD SLAE x86 OSEE e

material for exploit development

From noob to 0day developer Introduction the reason why I'm writting this kind of how-to become you into a exploit writer is because I was in the same boat as you , So I had to research link by link to find the right ones I call this kind of how-to course from noob to hero covering the basics of penetration testing to the hottest topic such as Sandbox Escape The inspirat

我在学习浏览器安全过程中整理的漏洞分析笔记与相关的学习资料

BrowserSecurity 下载编译Chromium源码 IE8堆溢出漏洞CVE-2012-1876 CVE-2013-3893 IE UAF漏洞分析 Win10编译Chromium

DEPRECATED Going forwards, this repo won't be updated The list is instead being maintained on my blog (reversingblog) About This document serves as a list of resources, and other things that aid in malware analysis / dev and exploit dev, which will be updated frequently Feel free to contribute resources Courses Paid courses/certificates OSED eCXD SLAE x86 OSEE e

XKungFoo 2013 PPT

XKungFoo-2013 XKungFoo 2013《IE 0day Analysis And Exploit》 主要通过对多个IE相关漏洞的分析与总结,向大家介绍像IE这样复杂、庞大并且无源码的应用软件在发生漏洞时,我们如何对其进行快速、深入并准确的分析。主要以两个IE 0day漏洞CVE-2013-3893和CVE-2013-3918来举例,通过实际的分析思路与步骤对

Recent Articles

New York Times hackers linked to Japan Ichitaro attacks
The Register • Phil Muncaster • 18 Nov 2013

Backdoors targeting government victims

Security experts have uncovered attacks exploiting a zero day vulnerability in Japan’s most popular word processing software, bearing all the hallmarks of a Chinese group blamed for last year's New York Times hack. Ichitaro developer, JustSystems, announced a remote code execution vulnerability in multiple versions of the software last week. Symantec has claimed, in a blog post, that it had already detected attacks in the wild attempting to exploit this vulnerability, which could lead to the e...

Happy 10th b-day, Patch Tuesday: TWO critical IE 0-day bugs, did you say?
The Register • John Leyden • 09 Oct 2013

A decade on, Microsoft pushes out 8 bulletins – half of 'em critical bug squishes

Microsoft delivered no fewer than eight bulletins to mark the tenth anniversary of Patch Tuesday, including a fix covering two zero-day vulnerabilities in Internet Explorer. A critical patch for all supported versions of IE covers a well-anticipated fix for the CVE-2013-3893 vulnerability, which has been associated with cyber espionage-style attacks against targets in Japan, Taiwan and elsewhere in Asia since late August. Microsoft also released a bonus extra fix for another in-the-wild browser ...

Microsoft Updates October 2013
Securelist • Kurt Baumgartner • 08 Oct 2013

Microsoft’s 2013 Treehouse of Horror Bulletins include a long list of fixes for memory corruption vulnerabilities effecting mostly previous versions of the software, and not the latest versions. Of immediate interest to most Windows users are the critical vulnerabilities being patched in Internet Explorer, multiple Windows drivers, and the .Net Framework which even effects the latest versions of Windows 8 and Windows Server 2012. Systems administrators at organizations also may pay immediate a...

Hang in there, Internet Explorer peeps: Gaping zero-day fix coming Tues
The Register • John Leyden • 04 Oct 2013

What a way to celebrate a DECADE of Patch Tuesday rollouts

Microsoft is preparing to close a wide-open security hole in Internet Explorer - a vulnerability state-backed spies are exploiting to mine organisations across Asia. A update to fix the flaw is among four critical patches Redmond has lined up for the October edition of Patch Tuesday, due next week. Versions 6 through to 11 of the web browser are known to be vulnerable. The use-after-free bug in Internet Explorer [CVE-2013-3893] allows attackers to execute arbitrary code on a victim's computer; a...

Targeted Exploit
Securelist • Anton Ivanov • 03 Oct 2013

In September Microsoft published information about a new Internet Explorer vulnerability – CVE-2013-3893. The vulnerability affects IE versions 6 through 11 for platforms from Windows XP through Windows 8.1. Later in September, the company released a patch closing the vulnerability. Cybercriminals are happy to exploit such vulnerabilities because they are easy to monetize – the Internet Explorer remains popular. This type of vulnerability is very dangerous because it allows the execution...

Hackers just POURING through unpatched Internet Explorer zero-day hole
The Register • John Leyden • 01 Oct 2013

Oh, sysadmins. It's so much worse than we feared – report

An as-yet-unpatched zero-day vulnerability affecting Internet Explorer is being abused much more widely than analysts had previously suspected. The vulnerability first came to public attention last week with the Operation DeputyDog attacks against targets in Japan, as first reported by net security firm FireEye. Websense, FireEye and AlienVault have since reported more malware-flinging campaigns exploiting this vulnerability. Several groups are using an exploit that takes advantage of security b...

DeputyDog attack targets latest IE zero day
The Register • Phil Muncaster • 23 Sep 2013

Bit9 attackers aim malware at Japanese 'entities'

Security researchers have spotted two new targeted attack campaigns aimed at organisations in Japan, China and elsewhere in Asia, one of which exploits a zero day exploit in Internet Explorer revealed only last week. Operation DeputyDog is targeted at “entities in Japan”, using the IE vulnerability CVE-2013-3893 which Microsoft released an emergency patch for last Tuesday, according to security firm FireEye. The payload for the attack, first detected by FireEye at the end of August, was host...

Redmond slips out temporary emergency fix for IE 0-day
The Register • Richard Chirgwin • 17 Sep 2013

Remote code execution vuln

Stepping outside its normal Patch Tuesday cycle, Microsoft has rolled out an emergency fix to an Internet Explorer bug that was under active malware attack. This advisory provides access to “Fix it For Me”, with a more detailed outline of the CVE-2013-3893 vulnerability here. All versions of IE 6 to 10 are affected. As Microsoft writes, the vulnerability “exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vuln...