MS KB2794220: Vulnerability in Internet Explorer Could Allow Remote Code Execution (deprecated)

High Nessus Plugin ID 63372


The remote host has a web browser installed that is affected by a remote code execution vulnerability.


The remote host is missing the workaround referenced in KB 2794220 (Microsoft 'Fix it' 50971). This workaround mitigates a use-after-free vulnerability in Internet Explorer. Without this workaround enabled, an attacker could exploit this vulnerability by tricking a user into viewing a maliciously crafted web page, resulting in arbitrary code execution. This vulnerability is being actively exploited in the wild.

Note that the Microsoft 'Fix it' solution is effective only if the latest available version of 'mshtml.dll' is installed.

This plugin has been deprecated due to the publication of MS13-008. Microsoft has released updates that make the workarounds unnecessary. To check for those, use Nessus plugin ID 63522.


Apply Microsoft 'Fix it' 50971.

See Also

Plugin Details

Severity: High

ID: 63372

File Name: smb_kb2794220.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 2013/01/02

Updated: 2018/11/15

Dependencies: 13855

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows, cpe:/a:microsoft:ie

Required KB Items: SMB/Registry/Enumerated, SMB/WindowsVersion, SMB/ProductName

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/12/31

Vulnerability Publication Date: 2012/12/28

Exploitable With

Core Impact

Metasploit (MS13-008 Microsoft Internet Explorer CButton Object Use-After-Free Vulnerability)

Reference Information

CVE: CVE-2012-4792

BID: 57070

CERT: 154201

EDB-ID: 23754

MSKB: 2794220