Skip to main content

Microsoft Internet Explorer Multiple Vulnerabilities

Last Update Date: 15 Aug 2012 16:56 Release Date: 15 Aug 2012 4285 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers
  1. Layout Memory Corruption Vulnerability

    A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

  2. Asynchronous NULL Object Access Remote Code Execution Vulnerability

    A remote code execution vulnerability exists in the way that Internet Explorer accesses a corrupted virtual function table that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

  3. Virtual Function Table Corruption Remote Code Execution Vulnerability

    A remote code execution vulnerability exists in the way that Internet Explorer accesses a corrupted virtual function table that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

  4. JavaScript Integer Overflow Remote Code Execution Vulnerability

    A remote code execution vulnerability exists in the way that Internet Explorer calculates the size of an object in memory during a copy operation. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.


Impact

  • Remote Code Execution

System / Technologies affected

  • Windows XP
  • Windows Server 2003
  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows Server 2008 R2
  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link