First published: Wed Feb 13 2013(Updated: )
Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Internet Explorer | =8 | |
Any of | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
All of | ||
Internet Explorer | =10 | |
Any of | ||
Microsoft Windows 8.0 | ||
Microsoft Windows 8.0 | ||
Microsoft Windows RT | ||
Microsoft Windows Server | ||
All of | ||
Internet Explorer | =9 | |
Any of | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp2 | |
All of | ||
Internet Explorer | =7 | |
Any of | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
Internet Explorer | =8 | |
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
Internet Explorer | =10 | |
Microsoft Windows 8.0 | ||
Microsoft Windows 8.0 | ||
Microsoft Windows RT | ||
Microsoft Windows Server | ||
Internet Explorer | =9 | |
Microsoft Windows 7 | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Internet Explorer | =7 | |
Microsoft Windows Server | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0019 is rated as critical due to its ability to allow remote code execution through Internet Explorer.
To fix CVE-2013-0019, users should update Internet Explorer to the latest version or apply the security patches provided by Microsoft.
CVE-2013-0019 affects Internet Explorer versions 7 through 10.
Exploitation of CVE-2013-0019 could lead to remote attackers executing arbitrary code on the affected system.
While there are no permanent workarounds, users can mitigate the risk by using alternative browsers until the issue is resolved.