Microsoft Internet Explorer Multiple Vulnerabilities
RISK: High Risk
TYPE: Clients - Browsers
Layout Memory Corruption Vulnerability
A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Asynchronous NULL Object Access Remote Code Execution Vulnerability
A remote code execution vulnerability exists in the way that Internet Explorer accesses a corrupted virtual function table that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Virtual Function Table Corruption Remote Code Execution Vulnerability
A remote code execution vulnerability exists in the way that Internet Explorer accesses a corrupted virtual function table that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
JavaScript Integer Overflow Remote Code Execution Vulnerability
A remote code execution vulnerability exists in the way that Internet Explorer calculates the size of an object in memory during a copy operation. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Impact
- Remote Code Execution
System / Technologies affected
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7
- Windows Server 2008 R2
- Internet Explorer 6
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
http://technet.microsoft.com/en-us/security/bulletin/ms12-052
Vulnerability Identifier
Source
Related Link
Share with