{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-12-09T00:00:00.000Z","descriptions":[{"lang":"en","value":"Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and exploited in the wild in December 2008."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-12T19:57:01.000Z","orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft"},"references":[{"tags":["x_refsource_MISC"],"url":"http://www.scanw.com/blog/archives/303"},{"name":"1021381","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1021381"},{"tags":["x_refsource_MISC"],"url":"http://isc.sans.org/diary.html?storyid=5458"},{"name":"7583","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/7583"},{"name":"TA08-352A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA08-352A.html"},{"tags":["x_refsource_MISC"],"url":"http://code.google.com/p/inception-h2hc/"},{"name":"VU#493881","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/493881"},{"name":"oval:org.mitre.oval:def:6007","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6007"},{"name":"32721","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/32721"},{"name":"7477","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/7477"},{"name":"HPSBST02397","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=123015308222620&w=2"},{"tags":["x_refsource_MISC"],"url":"http://www.breakingpointsystems.com/community/blog/patch-tuesdays-and-drive-by-sundays"},{"name":"SSRT080187","tags":["vendor-advisory","x_refsource_HP"],"url":"http://marc.info/?l=bugtraq&m=123015308222620&w=2"},{"name":"ADV-2008-3391","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/3391"},{"tags":["x_refsource_MISC"],"url":"http://www.avertlabs.com/research/blog/index.php/2008/12/09/yet-another-unpatched-drive-by-exploit-found-on-the-web/"},{"name":"7403","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/7403"},{"name":"TA08-344A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA08-344A.html"},{"name":"7410","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/7410"},{"name":"MS08-078","tags":["vendor-advisory","x_refsource_MS"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-078"},{"name":"33089","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/33089"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.microsoft.com/technet/security/advisory/961051.mspx"},{"tags":["x_refsource_MISC"],"url":"http://blogs.msdn.com/sdl/archive/2008/12/18/ms08-078-and-the-sdl.aspx"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@microsoft.com","ID":"CVE-2008-4844","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and exploited in the wild in December 2008."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://www.scanw.com/blog/archives/303","refsource":"MISC","url":"http://www.scanw.com/blog/archives/303"},{"name":"1021381","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1021381"},{"name":"http://isc.sans.org/diary.html?storyid=5458","refsource":"MISC","url":"http://isc.sans.org/diary.html?storyid=5458"},{"name":"7583","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/7583"},{"name":"TA08-352A","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA08-352A.html"},{"name":"http://code.google.com/p/inception-h2hc/","refsource":"MISC","url":"http://code.google.com/p/inception-h2hc/"},{"name":"VU#493881","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/493881"},{"name":"oval:org.mitre.oval:def:6007","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6007"},{"name":"32721","refsource":"BID","url":"http://www.securityfocus.com/bid/32721"},{"name":"7477","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/7477"},{"name":"HPSBST02397","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=123015308222620&w=2"},{"name":"http://www.breakingpointsystems.com/community/blog/patch-tuesdays-and-drive-by-sundays","refsource":"MISC","url":"http://www.breakingpointsystems.com/community/blog/patch-tuesdays-and-drive-by-sundays"},{"name":"SSRT080187","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=123015308222620&w=2"},{"name":"ADV-2008-3391","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/3391"},{"name":"http://www.avertlabs.com/research/blog/index.php/2008/12/09/yet-another-unpatched-drive-by-exploit-found-on-the-web/","refsource":"MISC","url":"http://www.avertlabs.com/research/blog/index.php/2008/12/09/yet-another-unpatched-drive-by-exploit-found-on-the-web/"},{"name":"7403","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/7403"},{"name":"TA08-344A","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA08-344A.html"},{"name":"7410","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/7410"},{"name":"MS08-078","refsource":"MS","url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-078"},{"name":"33089","refsource":"SECUNIA","url":"http://secunia.com/advisories/33089"},{"name":"http://www.microsoft.com/technet/security/advisory/961051.mspx","refsource":"CONFIRM","url":"http://www.microsoft.com/technet/security/advisory/961051.mspx"},{"name":"http://blogs.msdn.com/sdl/archive/2008/12/18/ms08-078-and-the-sdl.aspx","refsource":"MISC","url":"http://blogs.msdn.com/sdl/archive/2008/12/18/ms08-078-and-the-sdl.aspx"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T10:31:27.906Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.scanw.com/blog/archives/303"},{"name":"1021381","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1021381"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://isc.sans.org/diary.html?storyid=5458"},{"name":"7583","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/7583"},{"name":"TA08-352A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA08-352A.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://code.google.com/p/inception-h2hc/"},{"name":"VU#493881","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/493881"},{"name":"oval:org.mitre.oval:def:6007","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6007"},{"name":"32721","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/32721"},{"name":"7477","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/7477"},{"name":"HPSBST02397","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=123015308222620&w=2"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.breakingpointsystems.com/community/blog/patch-tuesdays-and-drive-by-sundays"},{"name":"SSRT080187","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=123015308222620&w=2"},{"name":"ADV-2008-3391","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/3391"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.avertlabs.com/research/blog/index.php/2008/12/09/yet-another-unpatched-drive-by-exploit-found-on-the-web/"},{"name":"7403","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/7403"},{"name":"TA08-344A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA08-344A.html"},{"name":"7410","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/7410"},{"name":"MS08-078","tags":["vendor-advisory","x_refsource_MS","x_transferred"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-078"},{"name":"33089","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/33089"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.microsoft.com/technet/security/advisory/961051.mspx"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://blogs.msdn.com/sdl/archive/2008/12/18/ms08-078-and-the-sdl.aspx"}]}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2008-4844","datePublished":"2008-12-11T15:00:00.000Z","dateReserved":"2008-10-31T00:00:00.000Z","dateUpdated":"2024-08-07T10:31:27.906Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}