cve/2012/CVE-2012-1876.md

24 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2012-1876](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1876)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
### POC
#### Reference
- http://www.zdnet.com/blog/security/pwn2own-2012-ie-9-hacked-with-two-0day-vulnerabilities/10621
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037
#### Github
- https://github.com/ExploitCN/CVE-2012-1876-win7_x86_and_win7x64
- https://github.com/WizardVan/CVE-2012-1876
2024-06-07 17:53:02 +00:00
- https://github.com/ernestang98/win-exploits
2024-05-26 14:27:05 +02:00
- https://github.com/migraine-sudo/Arsenal
- https://github.com/ricew4ng/BrowserSecurity
- https://github.com/ser4wang/BrowserSecurity