|
|||
Rule General Information |
---|
Release Date: | 2019-06-27 | |
Rule Name: | Microsoft Internet Explorer VML use after free Vulnerability (CVE-2012-0172) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "VML Style Remote Code Execution Vulnerability." | |
Impact: | A use-after-free vulnerability can be exploited by an attacker in the vulnerable product. Successful exploit may cause some adverse consequences, such as crash of the product, execution of arbitrary code. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityTrackerID:1026901 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-023 http://www.us-cert.gov/cas/techalerts/TA12-101A.html https://exchange.xforce.ibmcloud.com/vulnerabilities/74383 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://technet.microsoft.com/zh-cn/security/bulletin/ms12-023 |