CVE-2012-4792

HIGH8.8/ 10.0
Share:
Published: December 30, 2012 at 06:55 PM
Modified: October 22, 2025 at 01:15 AM
Source: secure@microsoft.com

Vulnerability Description

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.

CVSS Metrics

Base Score
8.8
Severity
HIGH
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Weaknesses (CWE)

Source: nvd@nist.gov
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0

AI Security Analysis

01 // Technical Summary

Microsoft Internet Explorer 6-8 is vulnerable to a critical use-after-free vulnerability, allowing remote attackers to achieve arbitrary code execution. This flaw, actively exploited in the wild, enables attackers to compromise systems by tricking users into visiting malicious websites, potentially leading to complete system takeover.

02 // Vulnerability Mechanism

Step 1: Malicious Website Access: The victim is tricked into visiting a malicious website or opening an HTML file containing the exploit code.

Step 2: Object Instantiation and Manipulation: The webpage's JavaScript code creates and manipulates a CDwnBindInfo object (or similar object). This likely involves creating the object, triggering a specific event that releases the object, and then attempting to access it.

Step 3: Object Freeing: The crafted JavaScript code triggers the release of the CDwnBindInfo object, freeing the memory associated with it.

Step 4: Use-After-Free Trigger: The JavaScript code then attempts to access the freed memory region, potentially through a method call or property access on the freed object.

Step 5: Memory Corruption: This access leads to memory corruption, allowing the attacker to overwrite memory with malicious code.

Step 6: Code Execution: The overwritten memory contains malicious code, which is then executed by Internet Explorer, granting the attacker control of the victim's system.

03 // Deep Technical Analysis

The vulnerability stems from improper memory management within Internet Explorer's handling of objects, specifically the CDwnBindInfo object. The root cause is a use-after-free condition. When a crafted webpage triggers a sequence of events that releases a CDwnBindInfo object, subsequent attempts to access the freed memory region can lead to arbitrary code execution. The attacker crafts a malicious webpage that manipulates the object's lifecycle, causing it to be freed and then accessed. This access allows the attacker to overwrite memory with malicious code, which is then executed by the browser.

References & Intelligence

http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html
Source: secure@microsoft.com
Broken Link
http://blogs.technet.com/b/srd/archive/2012/12/29/new-vulnerability-affecting-internet-explorer-8-users.aspx
Source: secure@microsoft.com
Broken Link
http://blogs.technet.com/b/srd/archive/2012/12/31/microsoft-quot-fix-it-quot-available-for-internet-explorer-6-7-and-8.aspx
Source: secure@microsoft.com
Broken Link
http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/
Source: secure@microsoft.com
Third Party Advisory
http://labs.alienvault.com/labs/index.php/2012/just-another-water-hole-campaign-using-an-internet-explorer-0day/
Source: secure@microsoft.com
Broken Link
http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html
Source: secure@microsoft.com
Third Party AdvisoryVDB Entry
http://technet.microsoft.com/security/advisory/2794220
Source: secure@microsoft.com
PatchVendor Advisory
http://www.kb.cert.org/vuls/id/154201
Source: secure@microsoft.com
Third Party AdvisoryUS Government Resource
http://www.us-cert.gov/cas/techalerts/TA13-008A.html
Source: secure@microsoft.com
Third Party AdvisoryUS Government Resource
http://www.us-cert.gov/cas/techalerts/TA13-015A.html
Source: secure@microsoft.com
Third Party AdvisoryUS Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-008
Source: secure@microsoft.com
PatchVendor Advisory
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_cbutton_uaf.rb
Source: secure@microsoft.com
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16361
Source: secure@microsoft.com
Broken Link
http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://blogs.technet.com/b/srd/archive/2012/12/29/new-vulnerability-affecting-internet-explorer-8-users.aspx
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://blogs.technet.com/b/srd/archive/2012/12/31/microsoft-quot-fix-it-quot-available-for-internet-explorer-6-7-and-8.aspx
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://labs.alienvault.com/labs/index.php/2012/just-another-water-hole-campaign-using-an-internet-explorer-0day/
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://packetstormsecurity.com/files/119168/Microsoft-Internet-Explorer-CDwnBindInfo-Object-Use-After-Free.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party AdvisoryVDB Entry
http://technet.microsoft.com/security/advisory/2794220
Source: af854a3a-2127-422b-91ae-364da2661108
PatchVendor Advisory
http://www.kb.cert.org/vuls/id/154201
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party AdvisoryUS Government Resource
http://www.us-cert.gov/cas/techalerts/TA13-008A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party AdvisoryUS Government Resource
http://www.us-cert.gov/cas/techalerts/TA13-015A.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party AdvisoryUS Government Resource
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-008
Source: af854a3a-2127-422b-91ae-364da2661108
PatchVendor Advisory
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_cbutton_uaf.rb
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16361
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-4792
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
CVE-2012-4792 - HIGH Severity (8.8) | Free CVE Database | 4nuxd