CVE-2012-4792

HIGH KEV

Microsoft Internet Explorer <9 - Use After Free

Title source: llm

Description

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.

Exploits (5)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/23785
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/23754
github STUB 31 stars
by OpenSISE · cpoc
https://github.com/OpenSISE/CVE_PoC_Collect/tree/master/RCE/internet explorer/CVE-2012-4792
nomisec STUB
by WizardVan · poc
https://github.com/WizardVan/CVE-2012-4792
metasploit WORKING POC NORMAL
by eromang, mahmud ab rahman, juan vazquez, sinn3r, Peter Vreugdenhil · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_cbutton_uaf.rb

References (14)

Scores

CVSS v3 8.8
EPSS 0.9143
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CISA KEV 2024-07-23
VulnCheck KEV 2012-12-29
InTheWild.io 2020-09-28
ENISA EUVD EUVD-2012-4717
CWE
CWE-416
Status published
Products (3)
microsoft/internet_explorer 6
microsoft/internet_explorer 7
microsoft/internet_explorer 8
Published Dec 30, 2012
KEV Added Jul 23, 2024
Tracked Since Feb 18, 2026