CVE-2012-2557

Severity CVSS v4.0:
Pending analysis
Type:
CWE-399 Resource Management Errors
Publication date:
21/09/2012
Last modified:
11/04/2025

Description

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "cloneNode Use After Free Vulnerability."

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:6:beta1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:6:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:6:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:6:sp3:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:7:beta1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:7:beta2:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:7:beta3:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:7:rc1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:8:beta1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:8:beta2:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:8:rc1:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*