Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Vulnerability protection

Internet Explorer cumulative security update


Report ID: MS201307004
Date Published: 11 July 2013

Criticality: Critical
Compromise Type: cross-site-scripting remote-code-execution
Compromise From: remote


Affected Product/Component:

Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Internet Explorer 10




Summary

A cumulative security update for Internet Explorer has been released to address multiple reported vulnerabilities that could lead to cross-site scripting and remote code execution.



Detailed Description

Microsoft has released a cumulative security update for Internet Explorer (IE) to address multiple reported vulnerabilities. One of them is a cross-site scripting vulnerability that could lead to information disclosure. It was caused by an error in handling the encoding for Shift_JIS auto-selection, which allows the attacker to view content from different domains. The rest of the reported vulnerabilities, 16 in total, are all remote code execution vulnerabilities. They were caused by improper access of memory, resulting in memory corruption condition that could give ways for the attacker to execute code.

All of these issues have been resolved through the update by blocking cross-domain scrolling events in IE and by modifying the way of handling objects in memory. Users are recommended to install the latest update to protect their system from possible exploit attempts.



CVE Reference

CVE-2013-3166, CVE-2013-3115, CVE-2013-3143, CVE-2013-3144, CVE-2013-3145, CVE-2013-3146, CVE-2013-3147, CVE-2013-3148, CVE-2013-3149, CVE-2013-3150, CVE-2013-3151, CVE-2013-3152, CVE-2013-3153, CVE-2013-3161, CVE-2013-3162, CVE-2013-3163, CVE-2013-3164



Solution

Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms13-055)




Security Advisories

For a list of known vulnerabilities affecting F-Secure products and the released fixes, please refer to the Security Advisories page.