Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2009-3672
PUBLISHED
More InfoOfficial Page
Assigner-microsoft
Assigner Org ID-f38d906d-7342-40ea-92c1-6c4a2c6478c8
View Known Exploited Vulnerability (KEV) details
Published At-02 Dec, 2009 | 11:00
Updated At-07 Aug, 2024 | 06:38
Rejected At-
▼CVE Numbering Authority (CNA)

Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory that (1) were not properly initialized or (2) are deleted, which allows remote attackers to execute arbitrary code via vectors involving a call to the getElementsByTagName method for the STYLE tag name, selection of the single element in the returned list, and a change to the outerHTML property of this element, related to Cascading Style Sheets (CSS) and mshtml.dll, aka "HTML Object Memory Corruption Vulnerability." NOTE: some of these details are obtained from third party information. NOTE: this issue was originally assigned CVE-2009-4054, but Microsoft assigned a duplicate identifier of CVE-2009-3672. CVE consumers should use this identifier instead of CVE-2009-4054.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/archive/1/507984/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://www.kb.cert.org/vuls/id/515749
third-party-advisory
x_refsource_CERT-VN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6381
vdb-entry
signature
x_refsource_OVAL
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072
vendor-advisory
x_refsource_MS
http://www.us-cert.gov/cas/techalerts/TA09-342A.html
third-party-advisory
x_refsource_CERT
http://www.securityfocus.com/bid/37085
vdb-entry
x_refsource_BID
http://www.symantec.com/connect/blogs/zero-day-internet-explorer-exploit-published
x_refsource_MISC
http://www.microsoft.com/technet/security/advisory/977981.mspx
x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/3301
vdb-entry
x_refsource_VUPEN
http://secunia.com/advisories/37448
third-party-advisory
x_refsource_SECUNIA
http://www.securitytracker.com/id?1023293
vdb-entry
x_refsource_SECTRACK
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/archive/1/507984/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.kb.cert.org/vuls/id/515749
third-party-advisory
x_refsource_CERT-VN
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6381
vdb-entry
signature
x_refsource_OVAL
x_transferred
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-072
vendor-advisory
x_refsource_MS
x_transferred
http://www.us-cert.gov/cas/techalerts/TA09-342A.html
third-party-advisory
x_refsource_CERT
x_transferred
http://www.securityfocus.com/bid/37085
vdb-entry
x_refsource_BID
x_transferred
http://www.symantec.com/connect/blogs/zero-day-internet-explorer-exploit-published
x_refsource_MISC
x_transferred
http://www.microsoft.com/technet/security/advisory/977981.mspx
x_refsource_CONFIRM
x_transferred
http://www.vupen.com/english/advisories/2009/3301
vdb-entry
x_refsource_VUPEN
x_transferred
http://secunia.com/advisories/37448
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securitytracker.com/id?1023293
vdb-entry
x_refsource_SECTRACK
x_transferred
Details not found