VML vulnerability could allow remote code execution
Report ID: MS201302002
Date Published: 22 February 2013
Compromise Type: remote-code-execution
Compromise From: remote
Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Internet Explorer 10
A vulnerability involving the implementation of Vector Markup Language (VML) could allow an attacker to execute code on an affected system.
Microsoft has issued a security update to resolve a vulnerability that exists in the implementation of Vector Markup Language (VML). Internet Explorer (IE) version 6, 7, 8, 9, and 10 are all affected. The vulnerability was caused by a memory corruption condition that may rises when allocating VML buffers. An attacker could take advantage of the condition to execute code on an affected system and proceed to take complete control.
The update resolves this vulnerability by introducing modification in the way that IE handles objects in memory. Users are recommended to install the latest update as a protection measure against possible exploit attempts.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-010)
F-Secure Health Check
F-Secure's free tool, the Health Check, detects if your system is missing the patch for the vulnerability covered in this report.