CVE-2013-3893

HIGH
2013-09-18 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
PoC Detected
Oct 22, 2025 - 01:15 vuln.today
Public exploit code
Added to CISA KEV
Oct 22, 2025 - 01:15 cisa
CISA KEV
CVE Published
Sep 18, 2013 - 10:08 nvd
HIGH 8.8

Description

Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.

Analysis

Internet Explorer 6 through 11 contain a use-after-free vulnerability in the SetMouseCapture implementation that allows remote code execution through crafted JavaScript, exploited in targeted attacks via ms-help: URL protocol.

Technical Context

The CWE-399 use-after-free occurs in the mouse capture subsystem of mshtml.dll. Attackers used crafted JavaScript strings to trigger the free and reuse cycle. The innovative exploitation technique used ms-help: protocol URLs to load hxds.dll, a non-ASLR module, providing predictable gadget addresses for ROP chains.

Affected Products

['Microsoft Internet Explorer 6 through 11', 'mshtml.dll on all affected Windows versions']

Remediation

Apply Microsoft security update MS13-080. Disable the ms-help: URL protocol handler. Deploy EMET or Windows Defender Exploit Guard with forced ASLR.

Priority Score

74
Low Medium High Critical
KEV: +50
EPSS: +81.2
CVSS: +44
POC: +20

Share

CVE-2013-3893 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy