Microsoft Internet Explorer Multiple Vulnerabilities
Last Update Date:
12 Oct 2011 11:51
Release Date:
12 Oct 2011
5342
Views
RISK: High Risk
TYPE: Clients - Browsers
- Scroll Event Remote Code Execution Vulnerability
A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user. - OLEAuto32.dll Remote Code Execution Vulnerability
A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user. - Option Element Remote Code Execution Vulnerability
A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user. - OnLoad Event Remote Code Execution Vulnerability
A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user. - Jscript9.dll Remote Code Execution Vulnerability
A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user. - Select Element Remote Code Execution Vulnerability
A remote code execution vulnerability exists in the way that Internet Explorer accesses a dereferenced memory address. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user. - Body Element Remote Code Execution Vulnerability
A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user. - Virtual Function Table Corruption Remote Code Execution Vulnerability
A remote code execution vulnerability exists in the way that Internet Explorer accesses a virtual function table after it has been corrupted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.
Impact
- Remote Code Execution
System / Technologies affected
- Internet Explorer 6
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7
- Windows Server 2008 R2
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
http://technet.microsoft.com/en-us/security/bulletin/ms11-081
Vulnerability Identifier
- CVE-2011-1993
- CVE-2011-1995
- CVE-2011-1996
- CVE-2011-1997
- CVE-2011-1998
- CVE-2011-1999
- CVE-2011-2000
- CVE-2011-2001
Source
Related Link
Share with