|
|||
Rule General Information |
---|
Release Date: | 2018-11-05 | |
Rule Name: | WEB-CLIENT Microsoft Internet Explorer SLayoutRun Use After Free Vulnerability (CVE-2013-0025) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer SLayoutRun Use After Free Vulnerability." | |
Impact: | A use-after-free vulnerability can be exploited by an attacker in the vulnerable product. Successful exploit may cause some adverse consequences, such as crash of the product, execution of arbitrary code. | |
Affected OS: | Windows | |
Reference: | http://www.us-cert.gov/cas/techalerts/TA13-043B.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-009 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16294 |
|
Solutions |
---|
Microsoft has released a patch MS13-009 to eliminate the vulnerability. The patch can be downloaded at: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-009 |