Skip to main content

Microsoft Internet Explorer Multiple Vulnerabilities

Last Update Date: 13 Mar 2013 15:14 Release Date: 13 Mar 2013 4039 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers

Multiple use after free vulnerabilities exist in the way that Internet Explorer accesses an object in memory that has been deleted. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.


Impact

  • Remote Code Execution

System / Technologies affected

  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

 


Vulnerability Identifier


Source


Related Link