Summary
This host is missing a critical security update according to Microsoft Bulletin MS11-081.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will result in denial-of-service conditions.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms11-081
Insight
Multiple flaws are due to the way Internet Explorer handles, - dereferenced memory address aka 'Select Element'.
- accessing an object that was not properly initialized aka 'Jscript9.dll', 'OLEAuto32.dll'.
- accessing a deleted object aka 'Body Element', 'OnLoad Event', 'Option Element', 'Scroll Event'.
Affected
Microsoft Internet Explorer version 6.x/7.x/8.x/9.x
References
Severity
Classification
-
CVE CVE-2011-1993, CVE-2011-1995, CVE-2011-1996, CVE-2011-1997, CVE-2011-1998, CVE-2011-1999, CVE-2011-2000, CVE-2011-2001 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
- Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
- Microsoft .NET Framework Open Data Protocol DOS Vulnerability (2769327)
- Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
- Buffer Overrun In HTML Converter Could Allow Code Execution (823559)