MS Advisory (2794220) Vulnerability in Internet Explorer Could Allow Remote Code Execution

  Severity: HIGH
  CVE Identifier: CVE-2012-4792
  Advisory Date: DEC 31, 2012

  DESCRIPTION

A remote code execution vulnerability exists in the following versions of Internet Explorer:

  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8

The vulnerability may corrupt memory when Internet Explorer attempts to load an object that has already been deleted or can no longer be found in memory. When an attacker exploits this vulnerability, the attacker may execute code remotely. To exploit this vulnerability, an attacker must lure users to access a compromised website or a malicious webpage. The said site or webpage contains the code that exploits the vulnerability.

Note that users who are logged on a vulnerable system with privileges lesser than an administrator are less impacted. Also, this vulnerability does not exist on Internet Explorer 9 and 10.

  TREND MICRO PROTECTION INFORMATION

Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.

MS Bulletin ID Vulnerability ID DPI Rule Number DPI Rule Name Release Date IDF Compatibility
CVE-2012-4792 1005297 Microsoft Internet Explorer CDwnBindInfo Object Use-After-Free Vulnerability (CVE-2012-4792) 31-Dec-12 YES
CVE-2012-4792 1005298 Microsoft Internet Explorer CDwnBindInfo Object Use-After-Free Vulnerability (CVE-2012-4792) Obfuscated 31-Dec-12 YES
CVE-2012-2556 1005301 Identified Suspicious JavaScript Encoded Window Location Object 31-Dec-12 YES

  SOLUTION

  AFFECTED SOFTWARE AND VERSION

  • Internet Explorer 6 (Windows XP Service Pack 3)
  • Internet Explorer 6 (Windows XP Professional x64 Edition Service Pack 2)
  • Internet Explorer 6 (Windows Server 2003 Service Pack 2)
  • Internet Explorer 6 (Windows Server 2003 x64 Edition Service Pack 2)
  • Internet Explorer 6 (Windows Server 2003 with SP2 for Itanium-based Systems)
  • Internet Explorer 7 (Windows XP Service Pack 3)
  • Internet Explorer 7 (Windows XP Professional x64 Edition Service Pack 2)
  • Internet Explorer 7 (Windows Server 2003 Service Pack 2)
  • Internet Explorer 7 (Windows Server 2003 x64 Edition Service Pack 2)
  • Internet Explorer 7 (Windows Server 2003 with SP2 for Itanium-based Systems)
  • Internet Explorer 7 (Windows Vista Service Pack 2)
  • Internet Explorer 7 (Windows Vista x64 Edition Service Pack 2)
  • Internet Explorer 7 (Windows Server 2008 for 32-bit Systems Service Pack 2)
  • Internet Explorer 7 (Windows Server 2008 for x64-based Systems Service Pack 2)
  • Internet Explorer 7 (Windows Server 2008 for Itanium-based Systems Service Pack 2)
  • Internet Explorer 8 (Windows XP Service Pack 3)
  • Internet Explorer 8 (Windows XP Professional x64 Edition Service Pack 2)
  • Internet Explorer 8 (Windows Server 2003 Service Pack 2)
  • Internet Explorer 8 (Windows Server 2003 x64 Edition Service Pack 2)
  • Internet Explorer 8 (Windows Vista Service Pack 2)
  • Internet Explorer 8 (Windows Vista x64 Edition Service Pack 2)
  • Internet Explorer 8 (Windows Server 2008 for 32-bit Systems Service Pack 2)
  • Internet Explorer 8 (Windows Server 2008 for x64-based Systems Service Pack 2)
  • Internet Explorer 8 (Windows 7 for 32-bit Systems)
  • Internet Explorer 8 (Windows 7 for 32-bit Systems Service Pack 1)
  • Internet Explorer 8 (Windows 7 for x64-based Systems)
  • Internet Explorer 8 (Windows 7 for x64-based Systems Service Pack 1)
  • Internet Explorer 8 (Windows Server 2008 R2 for x64-based Systems)
  • Internet Explorer 8 (Windows Server 2008 R2 for x64-based Systems Service Pack 1)
  • Internet Explorer 8 (Windows Server 2008 R2 for Itanium-based Systems)
  • Internet Explorer 8 (Windows Server 2008 R2 for Itanium-based Systems Service Pack 1)