Copyright 2022 - CSIM - Asian Institute of Technology

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Subject: US-CERT Alert TA12-262A - Microsoft Security Advisory for Internet Explorer Exploit
From: US-CERT Alerts <This email address is being protected from spambots. You need JavaScript enabled to view it.>
Date: Tue, 18 Sep 2012 17:38:24 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Awareness System

US-CERT Alert TA12-262A
Microsoft Security Advisory for Internet Explorer Exploit

Original release date: September 18, 2012
Last revised: --

Systems Affected

     * Microsoft Internet Explorer 7
     * Microsoft Internet Explorer 8
     * Microsoft Internet Explorer 9


Overview

   An unpatched use-after-free vulnerability in Microsoft Internet
   Explorer versions 7, 8, and 9 is being exploited in the wild.
   Microsoft has released Security Advisory 2757760 with mitigation
   techniques.


Description

   Microsoft Internet Explorer versions 7, 8, and 9 are susceptible to
   a use-after-free vulnerability. This vulnerability is being
   actively exploited in the wild. At this time, there is no patch
   available for this vulnerability. End-users can mitigate the
   vulnerability by using Microsoft's Enhanced Mitigation Experience
   Toolkit.

   Additional mitigation advice is available in the MSRC blog post:
   "Microsoft Releases Security Advisory 2757760" and US-CERT
   Vulnerability Note VU#480095.


Impact

   A remote, unauthenticated attacker could execute arbitrary code,
   cause a denial of service, or gain unauthorized access to your
   files or system.


Solution

   US-CERT recommends Internet Explorer users read Microsoft Security
   Advisory 2757760 and apply mitigation techniques such as using the
   Microsoft Enhanced Mitigation Experience Toolkit.


References

 * Microsoft Security Advisory (2757760)
   <http://technet.microsoft.com/en-us/security/advisory/2757760>

 * MSRC Blog: Microsoft Releases Security Advisory 2757760
   <http://blogs.technet.com/b/msrc/archive/2012/09/17/microsoft-releases-security-advisory-2757760.aspx>

 * Download Microsoft EMET 3.0
   <http://www.microsoft.com/en-us/download/details.aspx?id=29851>

 * US-CERT Vulnerability Note VU#480095
   <http://www.kb.cert.org/vuls/id/480095>


Revision History

  September 18, 2012: Initial release

 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <This email address is being protected from spambots. You need JavaScript enabled to view it.> with "TA12-262A Feedback VU#480095" in
   the subject.
 ____________________________________________________________________

   Produced by US-CERT, a government organization.
 ____________________________________________________________________

This product is provided subject to this Notification: 
http://www.us-cert.gov/privacy/notification.html

Privacy & Use policy: 
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/cas/techalerts/TA12-262A.html

For instructions on subscribing to or unsubscribing from this 
mailing list, visit http://www.us-cert.gov/cas/signup.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBUFjR/XdnhE8Qi3ZhAQKbYgf/ea8sgQoPJhjLd95pO0Xqejz+82rgVVFX
jiEAZcKpNygrCdh5NKNsEuZXQvsn4bew+pg3jgf5mplXLtl05WrOukZ7SL74GQjy
LFNPeRZ+nB8q6KwIEAGoeDFkewZqdzV0ro/z/ttMHjtbSteHoa9hrYqrwqPURZT0
JgGmth33YDV0VK1KZkgmD15mA1CMAPwbdVqL3WdznR/Dm9HyXi1XkRemA5TmBH8j
TpiMbHoUFZm79ZC/PbjE07NVZm5YNoTrWBZpebhsDssgnfBnL6J2BTtKeBKMVMcb
NNul23iMf7ydy6FjAvDmhmQ9A7WMyky+SFavYTr5GsXN8AkDhuOrJA==
=K/5z
-----END PGP SIGNATURE-----


Powered by: MHonArc

Login Form

Search

School of Engineering and technologies     Asian Institute of Technology