7.6
CVSSv2

CVE-2016-0189

Published: 11/05/2016 Updated: 12/10/2018
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 766
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0187.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft jscript 5.8

microsoft vbscript 5.8

microsoft vbscript 5.7

Exploits

Source: githubcom/theori-io/cve-2016-0189 # CVE-2016-0189 Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11) Tested on Windows 10 IE11 ### Write-up theoriio/research/cve-2016-0189 ### To run 1 Download `support/*dll` (or compile \*cpp for yourself) and `exploit/*html` to a directory 2 Serve t ...
This Metasploit module exploits the memory corruption vulnerability (CVE-2016-0189) present in the VBScript engine of Internet Explorer 11 ...

Github Repositories

Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)

CVE-2016-0189 Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11) Tested on Windows 10 IE11 Write-up theoriio/research/cve-2016-0189 To run Download support/*dll (or compile *cpp for yourself) and exploit/*html to a directory Serve the directory using a webserver (or python's simple HTTP server) Browse with a victim IE to vbscript

对CVE-2016-0189漏洞补丁的分析

CVE-2016-0189 Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11) Tested on Windows 10 IE 11 Write-up wwwdeamworkcom/archives/patch-analysis-of-cve-2016-0189orz6 To run Download support/*dll (or compile *cpp for yourself) and exploit/*html to a directory Serve the directory using a webserver (or python's simple HTTP server) Bro

2017-Codegate-Junior Drive-By download attack

2017Codegate_Drive-ByDownload CVE-2016-0189 file : drivegooglecom/file/d/0B1wKAh47Svc7OTFYbkNNYkZGV0k/view?usp=sharing

Analyzing Rig Exploit Kit

初めての Rig Exploit Kit リーディング この記事は@nao_sec(@kkrnt, @PINKSAWTOOTH)が2017-05-15に公開しました 書かれている内容について, 著者は一切の責任を負いません はじめに 私がDrive-by Download攻撃について趣味で調べ始めてから3ヶ月が経ちました それまでは攻撃の概要をぼんやりと知って

Recent Articles

The King is dead. Long live the King!
Securelist • Vladislav Stolyarov Boris Larin Anton Ivanov • 09 May 2018

In late April 2018, a new zero-day vulnerability for Internet Explorer (IE) was found using our sandbox; more than two years since the last in the wild example (CVE-2016-0189). This particular vulnerability and subsequent exploit are interesting for many reasons. The following article will examine the core reasons behind the latest vulnerability, CVE-2018-8174. Our story begins on VirusTotal (VT), where someone uploaded an interesting exploit on April 18, 2018. This exploit was detected by sever...

IT threat evolution Q1 2017. Statistics
Securelist • Roman Unuchek Fedor Sinitsyn Denis Parinov Vladislav Stolyarov • 22 May 2017

According to KSN data, Kaspersky Lab solutions detected and repelled 479,528,279 malicious attacks from online resources located in 190 countries all over the world. 79,209,775 unique URLs were recognized as malicious by web antivirus components. Attempted infections by malware that aims to steal money via online access to bank accounts were registered on 288 thousand user computers. Crypto ransomware attacks were blocked on 240,799 computers of unique users. Kaspersky Lab’s file antivirus det...

World's worst exploit kit weaponises white hats' proof of concept code
The Register • Darren Pauli • 18 Jul 2016

Plaid Parliament of Pwning's IE attack turned into pay-to-p0wn cannon

The new wearer of the crown for World's Worst Exploit Kit is compromising users with exploit code for a dangerous new attack published by a white hat researcher. Neutrino is the new king of for-profit p0wnage packages, a market in which criminals create tools to compromise scores of users through the latest vulnerabilities. Neutrino's authors, who have risen to prominence since the likely arrest of the former top dogs behind the Angler exploit kit, were quick to snap up exploit code published to...