Vulnerability

MS Advisory (2934088)Vulnerability in Internet Explorer Could Allow Remote Code Execution

Publish date: March 07, 2014

CVE-2014-0322

SEVERITY

CRITICAL

//  ADVISORY DATE

18 FEB 2014


DESCRIPTION

A remote code execution vulnerability exists in the way Internet Explorer 9 and 10 handles an object that has been deleted in memory. When successfully exploited, it may allow a remote attacker to execute code of choice on the vulnerable computer. Note that this vulnerability affects Internet Explorer 9 installed on the following operating systems:

  • Windows Vista Service Pack 2
  • Windows Vista x64 Edition Service Pack 2
  • Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2
  • Windows 7 for 32-bit Systems Service Pack 1
  • Windows 7 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1

It also affects Internet Explorer 10 installed on the following operating systems:

  • Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Windows 7 for 32-bit Systems Service Pack 1
  • Windows 7 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Windows 8 for 32-bit Systems
  • Windows 8 for x64-based Systems
  • Windows Server 2012
  • Windows RT

TREND MICRO PROTECTION INFORMATION

Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.

SOLUTION

PATCH: http://technet.microsoft.com/en-us/security/advisory/2934088

Trend Micro Deep Security DPI Rule Number: 1005909

Trend Micro Deep Security DPI Rule Name: 1005909 - Microsoft Internet Explorer Remote Code Execution Vulnerability (CVE-2014-0322) - 2

Featured Stories

Connect with us on