{"vuid":"VU#427980","idnumber":"427980","name":"Microsoft Internet Explorer 8 use-after-free vulnerability","keywords":["Microsoft","Internet Explorer","Circular Memory References Use-after-free"],"overview":"Microsoft Internet Explorer 8 is susceptible to a use-after-free vulnerability in the mshtml.dll library.","clean_desc":"The use-after-free vulnerability is triggered when handling circular memory references. Full details of the crash can be found at Michal Zalewski's website. Additional details about the fuzzer used to find this vulnerability can be found at Michal Zalewski's blog.","impact":"An attacker can cause the browser to crash and may be able to execute arbitrary code as the user.","resolution":"We are currently unaware of a practical solution to this problem.","workarounds":"Internet Explorer users should take advantage of the mitigations provided in Microsoft's Enhanced Mitigation Experience Toolkit.","sysaffected":"","thanks":"This vulnerability was reported to the public by Michal Zalewski.","author":"This document was written by Jared Allar.","public":["http://lcamtuf.blogspot.com/2011/01/announcing-crossfuzz-potential-0-day-in.html","http://seclists.org/fulldisclosure/2011/Jan/1","http://lcamtuf.coredump.cx/cross_fuzz/msie_crash.txt","http://msdn.microsoft.com/en-us/library/dd361842%28v=vs.85%29.aspx","http://blogs.technet.com/b/srd/archive/2010/09/02/enhanced-mitigation-experience-toolkit-emet-v2-0-0.aspx"],"cveids":["CVE-2011-0346"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2011-01-06T13:49:33Z","publicdate":"2011-01-01T00:00:00Z","datefirstpublished":"2011-01-06T15:18:59Z","dateupdated":"2011-01-10T12:28:36Z","revision":14,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"10","cam_exploitation":"0","cam_internetinfrastructure":"8","cam_population":"10","cam_impact":"11","cam_easeofexploitation":"2","cam_attackeraccessrequired":"15","cam_scorecurrent":"1.11375","cam_scorecurrentwidelyknown":"1.7325","cam_scorecurrentwidelyknownexploited":"2.97","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.11375,"vulnote":null}