Vulnerability Details : CVE-2016-0189
Public exploit exists!
The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0187.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Products affected by CVE-2016-0189
- cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*
- cpe:2.3:a:microsoft:jscript:5.8:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:vbscript:5.7:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:vbscript:5.8:*:*:*:*:*:*:*
CVE-2016-0189 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Microsoft Internet Explorer Memory Corruption Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
The Microsoft JScript nd VBScript engines, as used in Internet Explorer and other products, allow attackers to execute remote code or cause a denial of service (memory corruption) via a crafted web site.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2016-0189
Added on
2022-03-28
Action due date
2022-04-18
Exploit prediction scoring system (EPSS) score for CVE-2016-0189
92.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2016-0189
-
Internet Explorer 11 VBScript Engine Memory Corruption
Disclosure Date: 2016-05-10First seen: 2020-04-26exploit/windows/browser/ms16_051_vbscriptThis module exploits the memory corruption vulnerability (CVE-2016-0189) present in the VBScript engine of Internet Explorer 11. Authors: - Theori - William Webb <william_webb@rapid7.com>
CVSS scores for CVE-2016-0189
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.6
|
5.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.6
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-02-10 |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.6
|
5.9
|
NIST | 2024-07-09 |
CWE ids for CVE-2016-0189
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2016-0189
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-051
Microsoft Security Bulletin MS16-051 - Critical | Microsoft DocsPatch;Vendor Advisory
-
https://www.virusbulletin.com/virusbulletin/2017/01/journey-and-evolution-god-mode-2016-cve-2016-0189/
Virus Bulletin :: The journey and evolution of God Mode in 2016: CVE-2016-0189Exploit;Third Party Advisory
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-053
Microsoft Security Bulletin MS16-053 - Critical | Microsoft DocsPatch;Vendor Advisory
-
https://www.exploit-db.com/exploits/40118/
Microsoft Internet Explorer 11 (Windows 10) - VBScript Memory Corruption (MS16-051)Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/90012
Microsoft Internet Explorer CVE-2016-0189 Scripting Engine Remote Memory Corruption VulnerabilityBroken Link;Third Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1035820
Microsoft Internet Explorer Multiple Flaws Let Remote Users Bypass Code-Signing Validation, View Arbitrary Files, and Execute Arbitrary Code - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
Jump to