Skip to main content

Microsoft Internet Explorer Use After Free Vulnerability

Last Update Date: 15 May 2013 14:24 Release Date: 15 May 2013 3390 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers

A remote code execution vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.


Impact

  • Remote Code Execution

System / Technologies affected

  • Internet Explorer 8
  • Internet Explorer 9
  • Windows XP
  • Windows Server 2003
  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows Server 2008 R2

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link