MS KB2887505: Vulnerability in Internet Explorer Could Allow Remote Code Execution

High Nessus Plugin ID 69931


The remote host is affected by a remote code execution vulnerability.


The remote host is missing one of the workarounds referenced in KB 2887505.

The remote version of Internet Explorer (IE) reportedly has a memory corruption vulnerability related to how IE accesses an object in memory that has been deleted or has not been properly allocated. By exploiting this flaw, a remote, unauthenticated attacker could execute arbitrary code on the remote host subject to the privileges of the user running the affected application.


Apply the IE settings workarounds suggested by Microsoft in the advisory, or apply the MSHTML Shim workaround in the Microsoft 'Fix it' solution.

See Also

Plugin Details

Severity: High

ID: 69931

File Name: smb_kb2887505.nasl

Version: $Revision: 1.7 $

Type: local

Agent: windows

Family: Windows

Published: 2013/09/17

Modified: 2017/08/30

Dependencies: 13855, 49675

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:W/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows, cpe:/a:microsoft:ie

Required KB Items: SMB/Registry/Enumerated, SMB/WindowsVersion

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2013/09/17

Exploitable With

Core Impact

Metasploit (Microsoft Internet Explorer SetMouseCapture Use-After-Free)

Reference Information

CVE: CVE-2013-3893

BID: 62453

OSVDB: 97380

MSKB: 2887505