Vulnerability

MS Advisory (2847140) Vulnerability in Internet Explorer Could Allow Remote Code Execution

Publish date: March 04, 2014

CVE-2013-1347

SEVERITY

CRITICAL

//  ADVISORY DATE

07 MAY 2013


DESCRIPTION

This vulnerability allows attackers to remotely execute arbitrary code in a vulnerable system. It exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code. An attacker may host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer, and then form a scheme to get vulnerable users to visit that website.

TREND MICRO PROTECTION INFORMATION

Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.

MS Bulletin ID Vulnerability ID DPI Rule Number DPI Rule Name Release Date IDF Compatibility

CVE-2013-1347 1005491 Microsoft Internet Explorer Use-After-Free Remote Code Execution Vulnerability (CVE-2013-1347) 6-May-13 YES


1004934 Identified Malicious Java JAR Files - 1
YES

SOLUTION

AFFECTED SOFTWARE AND VERSION

  • Windows XP Service Pack 3
  • Windows XP Professional x64 Edition Service Pack 2
  • Windows Vista Service Pack 2
  • Windows Vista x64 Edition Service Pack 2
  • Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2
  • Windows 7 for 32-bit Systems Service Pack 1
  • Windows Server 2003 Service Pack 2
  • Windows Server 2003 x64 Edition Service Pack 2
  • Windows 7 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for Itanium-based Systems Service Pack 1

Featured Stories

Connect with us on