There exists a remote code execution vulnerability in the way that Internet Explorer accesses an object in memory that has been deleted. This vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Apply associated Trend Micro DPI Rules.