mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 11:06:19 +00:00
23 lines
1.2 KiB
Markdown
23 lines
1.2 KiB
Markdown
![]() |
### [CVE-2012-1876](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1876)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://www.zdnet.com/blog/security/pwn2own-2012-ie-9-hacked-with-two-0day-vulnerabilities/10621
|
||
|
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ExploitCN/CVE-2012-1876-win7_x86_and_win7x64
|
||
|
- https://github.com/WizardVan/CVE-2012-1876
|
||
|
- https://github.com/migraine-sudo/Arsenal
|
||
|
- https://github.com/ricew4ng/BrowserSecurity
|
||
|
- https://github.com/ser4wang/BrowserSecurity
|
||
|
|