Vulnerability Details : CVE-2008-4844
Public exploit exists!
Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and exploited in the wild in December 2008.
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2008-4844
- cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-4844
78.75%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2008-4844
-
MS08-078 Microsoft Internet Explorer Data Binding Memory Corruption
Disclosure Date: 2008-12-07First seen: 2020-04-26exploit/windows/browser/ms08_078_xml_corruptionThis module exploits a vulnerability in the data binding feature of Internet Explorer. In order to execute code reliably, this module uses the .NET DLL memory technique pioneered by Alexander Sotirov and Mark Dowd. This method is used to create a fake vtable at a known loc
CVSS scores for CVE-2008-4844
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2008-4844
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-4844
-
http://www.securitytracker.com/id?1021381
-
https://www.exploit-db.com/exploits/7583
-
http://www.us-cert.gov/cas/techalerts/TA08-352A.html
US Government Resource
-
http://isc.sans.org/diary.html?storyid=5458
Exploit
-
http://code.google.com/p/inception-h2hc/
-
https://www.exploit-db.com/exploits/7403
-
http://www.securityfocus.com/bid/32721
Microsoft Internet Explorer XML Handling Remote Code Execution Vulnerability
-
http://marc.info/?l=bugtraq&m=123015308222620&w=2
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6007
-
http://www.scanw.com/blog/archives/303
-
http://www.vupen.com/english/advisories/2008/3391
Vendor Advisory
-
http://www.kb.cert.org/vuls/id/493881
US Government Resource
-
http://www.avertlabs.com/research/blog/index.php/2008/12/09/yet-another-unpatched-drive-by-exploit-found-on-the-web/
-
https://www.exploit-db.com/exploits/7410
-
http://www.breakingpointsystems.com/community/blog/patch-tuesdays-and-drive-by-sundays
-
http://www.microsoft.com/technet/security/advisory/961051.mspx
Vendor Advisory
-
http://www.us-cert.gov/cas/techalerts/TA08-344A.html
Microsoft Updates for Multiple Vulnerabilities | CISAUS Government Resource
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-078
-
http://blogs.msdn.com/sdl/archive/2008/12/18/ms08-078-and-the-sdl.aspx
-
https://www.exploit-db.com/exploits/7477
Jump to