CVE-2013-3893
HIGHCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
Analysis
Internet Explorer 6 through 11 contain a use-after-free vulnerability in the SetMouseCapture implementation that allows remote code execution through crafted JavaScript, exploited in targeted attacks via ms-help: URL protocol.
Technical Context
The CWE-399 use-after-free occurs in the mouse capture subsystem of mshtml.dll. Attackers used crafted JavaScript strings to trigger the free and reuse cycle. The innovative exploitation technique used ms-help: protocol URLs to load hxds.dll, a non-ASLR module, providing predictable gadget addresses for ROP chains.
Affected Products
['Microsoft Internet Explorer 6 through 11', 'mshtml.dll on all affected Windows versions']
Remediation
Apply Microsoft security update MS13-080. Disable the ms-help: URL protocol handler. Deploy EMET or Windows Defender Exploit Guard with forced ASLR.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today