MS Advisory (2794220) Vulnerability in Internet Explorer Could Allow Remote Code Execution
DESCRIPTION
A remote code execution vulnerability exists in the following versions of Internet Explorer:
- Internet Explorer 6
- Internet Explorer 7
- Internet Explorer 8
The vulnerability may corrupt memory when Internet Explorer attempts to load an object that has already been deleted or can no longer be found in memory. When an attacker exploits this vulnerability, the attacker may execute code remotely. To exploit this vulnerability, an attacker must lure users to access a compromised website or a malicious webpage. The said site or webpage contains the code that exploits the vulnerability.
Note that users who are logged on a vulnerable system with privileges lesser than an administrator are less impacted. Also, this vulnerability does not exist on Internet Explorer 9 and 10.
TREND MICRO PROTECTION INFORMATION
Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.
MS Bulletin ID | Vulnerability ID | DPI Rule Number | DPI Rule Name | Release Date | IDF Compatibility |
CVE-2012-4792 | 1005297 | Microsoft Internet Explorer CDwnBindInfo Object Use-After-Free Vulnerability (CVE-2012-4792) | 31-Dec-12 | YES | |
CVE-2012-4792 | 1005298 | Microsoft Internet Explorer CDwnBindInfo Object Use-After-Free Vulnerability (CVE-2012-4792) Obfuscated | 31-Dec-12 | YES | |
CVE-2012-2556 | 1005301 | Identified Suspicious JavaScript Encoded Window Location Object | 31-Dec-12 | YES |
SOLUTION
AFFECTED SOFTWARE AND VERSION
- Internet Explorer 6 (Windows XP Service Pack 3)
- Internet Explorer 6 (Windows XP Professional x64 Edition Service Pack 2)
- Internet Explorer 6 (Windows Server 2003 Service Pack 2)
- Internet Explorer 6 (Windows Server 2003 x64 Edition Service Pack 2)
- Internet Explorer 6 (Windows Server 2003 with SP2 for Itanium-based Systems)
- Internet Explorer 7 (Windows XP Service Pack 3)
- Internet Explorer 7 (Windows XP Professional x64 Edition Service Pack 2)
- Internet Explorer 7 (Windows Server 2003 Service Pack 2)
- Internet Explorer 7 (Windows Server 2003 x64 Edition Service Pack 2)
- Internet Explorer 7 (Windows Server 2003 with SP2 for Itanium-based Systems)
- Internet Explorer 7 (Windows Vista Service Pack 2)
- Internet Explorer 7 (Windows Vista x64 Edition Service Pack 2)
- Internet Explorer 7 (Windows Server 2008 for 32-bit Systems Service Pack 2)
- Internet Explorer 7 (Windows Server 2008 for x64-based Systems Service Pack 2)
- Internet Explorer 7 (Windows Server 2008 for Itanium-based Systems Service Pack 2)
- Internet Explorer 8 (Windows XP Service Pack 3)
- Internet Explorer 8 (Windows XP Professional x64 Edition Service Pack 2)
- Internet Explorer 8 (Windows Server 2003 Service Pack 2)
- Internet Explorer 8 (Windows Server 2003 x64 Edition Service Pack 2)
- Internet Explorer 8 (Windows Vista Service Pack 2)
- Internet Explorer 8 (Windows Vista x64 Edition Service Pack 2)
- Internet Explorer 8 (Windows Server 2008 for 32-bit Systems Service Pack 2)
- Internet Explorer 8 (Windows Server 2008 for x64-based Systems Service Pack 2)
- Internet Explorer 8 (Windows 7 for 32-bit Systems)
- Internet Explorer 8 (Windows 7 for 32-bit Systems Service Pack 1)
- Internet Explorer 8 (Windows 7 for x64-based Systems)
- Internet Explorer 8 (Windows 7 for x64-based Systems Service Pack 1)
- Internet Explorer 8 (Windows Server 2008 R2 for x64-based Systems)
- Internet Explorer 8 (Windows Server 2008 R2 for x64-based Systems Service Pack 1)
- Internet Explorer 8 (Windows Server 2008 R2 for Itanium-based Systems)
- Internet Explorer 8 (Windows Server 2008 R2 for Itanium-based Systems Service Pack 1)