MS KB2887505: Vulnerability in Internet Explorer Could Allow Remote Code Execution

This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by a remote code execution vulnerability.

Description :

The remote host is missing one of the workarounds referenced in KB
2887505.

The remote version of Internet Explorer (IE) reportedly has a memory
corruption vulnerability related to how IE accesses an object in memory
that has been deleted or has not been properly allocated. By exploiting
this flaw, a remote, unauthenticated attacker could execute arbitrary
code on the remote host subject to the privileges of the user running
the affected application.

See also :

http://technet.microsoft.com/en-us/security/advisory/2887505

Solution :

Apply the IE settings workarounds suggested by Microsoft in the
advisory, or apply the MSHTML Shim workaround in the Microsoft
'Fix it' solution.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.8
(CVSS2#E:ND/RL:W/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 69931 ()

Bugtraq ID: 62453

CVE ID: CVE-2013-3893

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now