Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Vulnerability protection

Internet Explorer cumulative security update


Report ID: MS201206002
Date Published: 13 June 2012

Criticality: Critical
Compromise Type: remote-code-execution information-disclosure
Compromise From: remote


Affected Product/Component:

Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9

 




Summary

A cumulative security update for Internet Explorer addresses 13 reported vulnerabilities, nine of which could lead to remote code execution while the other four could lead to information disclosure.



Detailed Description

Microsoft has released a security update for Internet Explorer (IE) to address 13 vulnerabilities, nine of which could lead to remote code execution while the other four could lead to information disclosure.

The remote code execution vulnerabilities were caused by a memory corruption that resulted when IE tries to access a deleted or non-existant object, or an undefined memory location. Upon successful exploit, an attacker could execute code in the context of a logged-on user.

The four information disclosure vulnerability were caused by several factors, such as incorrect way in handling content and character sequences, and mistakenly allowing attackers to access content from process memory and different domains.

These issues have been resolved in the latest update by making several modifications in IE. Users are recommended to install this update as a protection against potential exploit.



CVE Reference

CVE-2012-1523, CVE-2012-1858, CVE-2012-1872, CVE-2012-1873, CVE-2012-1874, CVE-2012-1875, CVE-2012-1876, CVE-2012-1877, CVE-2012-1878, CVE-2012,1879, CVE-2012-1880, CVE-2012-1881, CVE-2012-1882



Solution

Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-037)



Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.