Microsoft Windows Vector Markup Language Memory Corruption Vulnerability
RISK: High Risk
TYPE: Operating Systems - Windows OS
A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
Impact
- Remote Code Execution
System / Technologies affected
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7
- Windows Server 2008 R2
- Internet Explorer 6
- Internet Explorer 7
- Internet Explorer 8
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
http://www.microsoft.com/technet/security/Bulletin/MS11-052.mspx
Vulnerability Identifier
Source
Related Link
Share with