Summary
This host is missing a critical security update according to Microsoft Bulletin MS12-052.
Impact
Successful exploitation could allow remote attackers to execute arbitrary code in the context of the of the current user.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms12-052
Insight
- An error in the layout handling when accessing an improperly initialized or deleted object can be exploited to corrupt memory.
- A use-after-free error when asynchronously accessing NULL objects can be exploited to dereference an already deleted object.
- An error may cause a corrupted virtual function table that has already been deleted to be accessed.
- An integer overflow error in the JavaScript parsing when calculating the size of an object in memory during a copy operation can be exploited to corrupt memory.
Affected
Microsoft Internet Explorer version 6.x/7.x/8.x/9.x
References
Severity
Classification
-
CVE CVE-2012-1526, CVE-2012-2521, CVE-2012-2522, CVE-2012-2523 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- .NET JIT Compiler Vulnerability
- Cumulative Security Update for Internet Explorer (969897)
- Microsoft IE Developer Tools WMITools and Windows Messenger ActiveX Control Vulnerability (2508272)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
- ISA Server 2000 and Proxy Server 2.0 Internet Content Spoofing (888258)