FKIE_CVE-2011-1345

Vulnerability from fkie_nvd - Published: 2011-03-10 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, as demonstrated by Stephen Fewer as the first of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011, aka "Object Management Memory Corruption Vulnerability."
References
cve@mitre.orghttp://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011
cve@mitre.orghttp://twitter.com/aaronportnoy/statuses/45642180118855680
cve@mitre.orghttp://twitter.com/msftsecresponse/statuses/45646985998516224
cve@mitre.orghttp://www.computerworld.com/s/article/9214002/Safari_IE_hacked_first_at_Pwn2Own
cve@mitre.orghttp://www.securityfocus.com/bid/46821
cve@mitre.orghttp://www.securitytracker.com/id?1025327
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA11-102A.htmlUS Government Resource
cve@mitre.orghttp://www.zdnet.com/blog/security/pwn2own-2011-ie8-on-windows-7-hijacked-with-3-vulnerabilities/8367
cve@mitre.orghttps://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-018
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/66062
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12228
cve@mitre.orghttps://threatpost.com/en_us/blogs/pwn2own-winner-stephen-fewer-031011
af854a3a-2127-422b-91ae-364da2661108http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011
af854a3a-2127-422b-91ae-364da2661108http://twitter.com/aaronportnoy/statuses/45642180118855680
af854a3a-2127-422b-91ae-364da2661108http://twitter.com/msftsecresponse/statuses/45646985998516224
af854a3a-2127-422b-91ae-364da2661108http://www.computerworld.com/s/article/9214002/Safari_IE_hacked_first_at_Pwn2Own
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/46821
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025327
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA11-102A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.zdnet.com/blog/security/pwn2own-2011-ie8-on-windows-7-hijacked-with-3-vulnerabilities/8367
af854a3a-2127-422b-91ae-364da2661108https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-018
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/66062
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12228
af854a3a-2127-422b-91ae-364da2661108https://threatpost.com/en_us/blogs/pwn2own-winner-stephen-fewer-031011
Impacted products
Vendor Product Version
microsoft internet_explorer 8
microsoft windows_7 *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A52E757F-9B41-43B4-9D67-3FEDACA71283",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D56B932B-9593-44E2-B610-E4EB2143EB21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, as demonstrated by Stephen Fewer as the first of three chained vulnerabilities during a Pwn2Own competition at CanSecWest 2011, aka \"Object Management Memory Corruption Vulnerability.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad sin especificar en Microsoft Internet Explorer 8 en Windows 7 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores de ataque desconocidos, como ha demostrado Stephen Fewer con la primera de las tres vulnerabilidades encadenadas durante el concurso Pwn2Own en la CanSecWest 2011."
    }
  ],
  "id": "CVE-2011-1345",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-03-10T20:55:01.313",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://twitter.com/aaronportnoy/statuses/45642180118855680"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://twitter.com/msftsecresponse/statuses/45646985998516224"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.computerworld.com/s/article/9214002/Safari_IE_hacked_first_at_Pwn2Own"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/46821"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1025327"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.zdnet.com/blog/security/pwn2own-2011-ie8-on-windows-7-hijacked-with-3-vulnerabilities/8367"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-018"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66062"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12228"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://threatpost.com/en_us/blogs/pwn2own-winner-stephen-fewer-031011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://twitter.com/aaronportnoy/statuses/45642180118855680"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://twitter.com/msftsecresponse/statuses/45646985998516224"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.computerworld.com/s/article/9214002/Safari_IE_hacked_first_at_Pwn2Own"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA11-102A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.zdnet.com/blog/security/pwn2own-2011-ie8-on-windows-7-hijacked-with-3-vulnerabilities/8367"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66062"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12228"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://threatpost.com/en_us/blogs/pwn2own-winner-stephen-fewer-031011"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…