RULE(RULE ID:324403)

Rule General Information
Release Date: 2020-03-25
Rule Name: Microsoft Internet Explorer toJSON callback Use-After-Free Vulnerability (CVE-2019-1429)
Severity:
CVE ID:
Rule Protection Details
Description: A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1426, CVE-2019-1427, CVE-2019-1428.
Impact: A use-after-free vulnerability can be exploited by an attacker in the vulnerable product. Successful exploit may cause some adverse consequences, such as crash of the product, execution of arbitrary code.
Affected OS: Windows
Reference: http://packetstormsecurity.com/files/155433/Microsoft-Internet-Explorer-Use-After-Free.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1429
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1429