MS Advisory (2934088)Vulnerability in Internet Explorer Could Allow Remote Code Execution

  Severity: CRITICAL
  CVE Identifier: CVE-2014-0322
  Advisory Date: FEB 18, 2014

  DESCRIPTION

A remote code execution vulnerability exists in the way Internet Explorer 9 and 10 handles an object that has been deleted in memory. When successfully exploited, it may allow a remote attacker to execute code of choice on the vulnerable computer. Note that this vulnerability affects Internet Explorer 9 installed on the following operating systems:

  • Windows Vista Service Pack 2
  • Windows Vista x64 Edition Service Pack 2
  • Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2
  • Windows 7 for 32-bit Systems Service Pack 1
  • Windows 7 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1

It also affects Internet Explorer 10 installed on the following operating systems:

  • Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Windows 7 for 32-bit Systems Service Pack 1
  • Windows 7 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Windows 8 for 32-bit Systems
  • Windows 8 for x64-based Systems
  • Windows Server 2012
  • Windows RT

  TREND MICRO PROTECTION INFORMATION

Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.

  SOLUTION

  PATCH: http://technet.microsoft.com/en-us/security/advisory/2934088

  Trend Micro Deep Security DPI Rule Number: 1005909
  Trend Micro Deep Security DPI Rule Name: 1005909 - Microsoft Internet Explorer Remote Code Execution Vulnerability (CVE-2014-0322) - 2