RULE(RULE ID:322110)

Rule General Information
Release Date: 2019-06-27
Rule Name: Microsoft Internet Explorer VML use after free Vulnerability (CVE-2012-0172)
Severity:
CVE ID:
Rule Protection Details
Description: Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "VML Style Remote Code Execution Vulnerability."
Impact: A use-after-free vulnerability can be exploited by an attacker in the vulnerable product. Successful exploit may cause some adverse consequences, such as crash of the product, execution of arbitrary code.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: SecurityTrackerID:1026901
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-023
http://www.us-cert.gov/cas/techalerts/TA12-101A.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/74383
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
http://technet.microsoft.com/zh-cn/security/bulletin/ms12-023