Parameter Validation Memory Corruption Vulnerability
Publish Date: 15 février 2011
Gravité: : Élevé
Identifiant(s) CVE: : CVE-2008-4258
Date du conseil: 15 février 2011
Description
Microsoft Internet Explorer 5.01 SP4 and 6 SP1 does not properly validate parameters during calls to navigation methods, which allows remote attackers to execute arbitrary code via a crafted HTML document that triggers memory corruption, aka "Parameter Validation Memory Corruption Vulnerability."
Information Exposure Rating:
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1003117
Trend Micro Deep Security DPI Rule Name: 1003117 - Parameter Validation Memory Corruption Vulnerability
Affected software and version:
- microsoft internet_explorer 5.01
- microsoft internet_explorer 6
- microsoft internet_explorer 7