Uninitialized Memory Corruption Remote Code Execution Vulnerability
Publish Date: 15 février 2011
Gravité: : Critique
Identifiant(s) CVE: : CVE-2009-0554
Date du conseil: 15 février 2011
Description
Microsoft Internet Explorer 5.01 SP4, 6 SP1, 6 and 7 on Windows XP SP2 and SP3,
6 and 7 on Windows Server 2003 SP1 and SP2, 7 on Windows Vista Gold and SP1, and
7 on Windows Server 2008 allows remote attackers to execute arbitrary code via a
web page that triggers presence of an object in memory that was (1) not properly
initialized or (2) deleted, aka "Uninitialized Memory Corruption
Vulnerability."
Information Exposure Rating:
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1003429
Trend Micro Deep Security DPI Rule Name: 1003429 - Uninitialized Memory Corruption Remote Code Execution Vulnerability
Affected software and version:
- microsoft internet_explorer 5.01
- microsoft internet_explorer 6
- microsoft internet_explorer 7