Summary
This host is missing a critical security update according to Microsoft Bulletin MS11-081.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will result in denial-of-service conditions.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms11-081
Insight
Multiple flaws are due to the way Internet Explorer handles, - dereferenced memory address aka 'Select Element'.
- accessing an object that was not properly initialized aka 'Jscript9.dll', 'OLEAuto32.dll'.
- accessing a deleted object aka 'Body Element', 'OnLoad Event', 'Option Element', 'Scroll Event'.
Affected
Microsoft Internet Explorer version 6.x/7.x/8.x/9.x
References
Severity
Classification
-
CVE CVE-2011-1993, CVE-2011-1995, CVE-2011-1996, CVE-2011-1997, CVE-2011-1998, CVE-2011-1999, CVE-2011-2000, CVE-2011-2001 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Message Queuing Remote Code Execution Vulnerability (951071)
- ISA Server 2000 and Proxy Server 2.0 Internet Content Spoofing (888258)
- Cumulative Security Update for Internet Explorer (958215)
- Microsoft .NET Framework Privilege Elevation Vulnerability (2958732)
- Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)