Summary
This host is missing a critical security update according to Microsoft Bulletin MS12-063.
Impact
Successful exploitation could allow remote attackers to gain sensitive information or execute arbitrary code in the context of the current user.
Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms12-063
Insight
Multiple vulnerabilities exists due to the way that Internet Explorer accesses an object that has been deleted and causing multiple use-after-free errors when,
- Handling onMove events, event listeners aand the execCommand method.
- Cloning nodes and layout handling.
Affected
Microsoft Internet Explorer version 6.x/7.x/8.x/9.x
References
- http://blogs.technet.com/b/msrc/archive/2012/09/17/microsoft-releases-security-advisory-2757760.aspx
- http://secunia.com/advisories/50626
- http://support.microsoft.com/kb/2744842
- http://technet.microsoft.com/en-us/security/advisory/2757760
- http://technet.microsoft.com/en-us/security/bulletin/ms12-063
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2012-1529, CVE-2012-2546, CVE-2012-2548, CVE-2012-2557, CVE-2012-4969 -
CVSS Base Score: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
- Microsoft Internet Explorer Memory Corruption Vulnerability (2755801)
- Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
- Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
- Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)