Description
|
|
Multiple vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.
For more information:
SA61153
1) A use-after-free error when handling the CSetTimeoutInfo object can be exploited to corrupt memory.
2) An unspecified error can be exploited to bypass XSS filter.
3) A use-after-free error when handling the CTreePos object can be exploited to corrupt memory.
4) Another unspecified error can be exploited to corrupt memory.
5) An unspecified error can be exploited to bypass XSS filter.
6) An unspecified error can be exploited to corrupt memory.
7) An unspecified error can be exploited to bypass ASLR.
8) A use-after-free error when handling CTableSection objects can be exploited to corrupt memory.
9) Another unspecified error can be exploited to corrupt memory.
10) An error within the "RtfToForeign32" function can be exploited to cause a buffer overflow.
11) A use-after-free error when handling HTML elements created via the "execCommand" method can be exploited to corrupt memory.
12) An error within the "LineBoxBuilder::FindWord()" function can be exploited to cause a buffer overflow.
13) A type confusion error within the processing of the event handler of CInputElement elements can be exploited to corrupt memory.
Successful exploitation of vulnerabilities #1, #3, #4, #6, and #8 through #13 allows execution of arbitrary code.
|