Severity: : Critical
  CVE Kennungen: : CVE-2013-1347
  Advisory Date: 07 de мая de 2013

  DESCRIPTION

This vulnerability allows attackers to remotely execute arbitrary code in a vulnerable system. It exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code. An attacker may host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer, and then form a scheme to get vulnerable users to visit that website.

  INFORMATION EXPOSURE

Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.

MS Bulletin ID Vulnerability ID DPI Rule Number DPI Rule Name Release Date IDF Compatibility

CVE-2013-1347 1005491 Microsoft Internet Explorer Use-After-Free Remote Code Execution Vulnerability (CVE-2013-1347) 6-May-13 YES


1004934 Identified Malicious Java JAR Files - 1
YES

  SOLUTION

  AFFECTED SOFTWARE AND VERSION:

  • Windows XP Service Pack 3
  • Windows XP Professional x64 Edition Service Pack 2
  • Windows Vista Service Pack 2
  • Windows Vista x64 Edition Service Pack 2
  • Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2
  • Windows 7 for 32-bit Systems Service Pack 1
  • Windows Server 2003 Service Pack 2
  • Windows Server 2003 x64 Edition Service Pack 2
  • Windows 7 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for Itanium-based Systems Service Pack 1