Skip to main content

Microsoft Internet Explorer Multiple Vulnerabilities

Last Update Date: 12 Oct 2011 11:51 Release Date: 12 Oct 2011 4535 Views

RISK: High Risk

TYPE: Clients - Browsers

TYPE: Browsers
  1. Scroll Event Remote Code Execution Vulnerability
    A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.
  2. OLEAuto32.dll Remote Code Execution Vulnerability
    A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.
  3. Option Element Remote Code Execution Vulnerability
    A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.
  4. OnLoad Event Remote Code Execution Vulnerability
    A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.
  5. Jscript9.dll Remote Code Execution Vulnerability
    A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has not been correctly initialized. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.
  6. Select Element Remote Code Execution Vulnerability
    A remote code execution vulnerability exists in the way that Internet Explorer accesses a dereferenced memory address. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.
  7. Body Element Remote Code Execution Vulnerability
    A remote code execution vulnerability exists in the way that Internet Explorer accesses an object that has been deleted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.
  8. Virtual Function Table Corruption Remote Code Execution Vulnerability
    A remote code execution vulnerability exists in the way that Internet Explorer accesses a virtual function table after it has been corrupted. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the logged-on user.

Impact

  • Remote Code Execution

System / Technologies affected

  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Windows XP
  • Windows Server 2003
  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows Server 2008 R2

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link