CVE-2009-1547

HIGH

Microsoft Internet Explorer - Code Injection

Title source: rule
STIX 2.1

Description

Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via a crafted data stream header that triggers memory corruption, aka "Data Stream Header Corruption Vulnerability."

Exploits (2)

exploitdb WORKING POC VERIFIED
by Skylined · textremotewindows
https://www.exploit-db.com/exploits/9893
exploitdb WORKING POC VERIFIED
by Skylined · textremotewindows
https://www.exploit-db.com/exploits/33270

References (3)

Core 3
Core References
US Government Resource third-party-advisory x_refsource_cert
http://www.us-cert.gov/cas/techalerts/TA09-286A.html
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6454

Scores

CVSS v3 8.8
EPSS 0.2969
EPSS Percentile 96.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-94
Status published
Products (10)
microsoft/internet_explorer 5.01 sp4
microsoft/internet_explorer 6 sp1 (2 CPE variants)
microsoft/internet_explorer 7
microsoft/internet_explorer 8
microsoft/windows_2000
microsoft/windows_7
microsoft/windows_server_2003
microsoft/windows_server_2008 (8 CPE variants)
microsoft/windows_vista (6 CPE variants)
microsoft/windows_xp (3 CPE variants)
Published Oct 14, 2009
Tracked Since Feb 18, 2026