CVE-2008-4844

N/A Unknown
Published: December 11, 2008 Modified: April 23, 2026
View on NVD

Description

Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and exploited in the wild in December 2008.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://code.google.com/p/inception-h2hc/
Source: secure@microsoft.com
http://isc.sans.org/diary.html?storyid=5458
Source: secure@microsoft.com
Exploit
http://secunia.com/advisories/33089
Source: secure@microsoft.com
Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/493881
Source: secure@microsoft.com
US Government Resource
http://www.microsoft.com/technet/security/advisory/961051.mspx
Source: secure@microsoft.com
Vendor Advisory
http://www.scanw.com/blog/archives/303
Source: secure@microsoft.com
http://www.securityfocus.com/bid/32721
Source: secure@microsoft.com
http://www.securitytracker.com/id?1021381
Source: secure@microsoft.com
http://www.us-cert.gov/cas/techalerts/TA08-344A.html
Source: secure@microsoft.com
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA08-352A.html
Source: secure@microsoft.com
US Government Resource
http://www.vupen.com/english/advisories/2008/3391
Source: secure@microsoft.com
Vendor Advisory
https://www.exploit-db.com/exploits/7403
Source: secure@microsoft.com
https://www.exploit-db.com/exploits/7410
Source: secure@microsoft.com
https://www.exploit-db.com/exploits/7477
Source: secure@microsoft.com
https://www.exploit-db.com/exploits/7583
Source: secure@microsoft.com
http://code.google.com/p/inception-h2hc/
Source: af854a3a-2127-422b-91ae-364da2661108
http://isc.sans.org/diary.html?storyid=5458
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://marc.info/?l=bugtraq&m=123015308222620&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33089
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/493881
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.microsoft.com/technet/security/advisory/961051.mspx
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.scanw.com/blog/archives/303
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/32721
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1021381
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA08-344A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA08-352A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2008/3391
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.exploit-db.com/exploits/7403
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/7410
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/7477
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/7583
Source: af854a3a-2127-422b-91ae-364da2661108

42 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
82.8%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft