Skip to main content

Microsoft Internet Explorer Multiple Vulnerabilities

Last Update Date: 11 Apr 2012 11:31 Release Date: 11 Apr 2012 5280 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers
  1. Print Feature Remote Code Execution Vulnerability

    A remote code execution vulnerability exists when Internet Explorer attempts to print a specially crafted HTML page. The vulnerability could allow an attacker to execute arbitrary code in the context of the current user.

  2. JScript9 Remote Code Execution Vulnerability

    A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

  3. OnReadyStateChange Remote Code Execution Vulnerability

    A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

  4. SelectAll Remote Code Execution Vulnerability

    A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

  5. VML Style Remote Code Execution Vulnerability

    A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.


Impact

  • Remote Code Execution

System / Technologies affected

  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Windows XP
  • Windows Server 2003
  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows Server 2008 R2

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link