This security update addresses one publicly disclosed and four privately reported vulnerabilities in Internet Explorer versions 6, 7, 8, and 9. The most severe of the vulnerabilities was found able to allow arbitrary code execution when exploited. This same vulnerability was earlier reported to have been used in targeted attacks and leading to remote access tools (RATs).
Additional details of the mentioned vulnerability can be found here:
Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.
MS Bulletin ID
DPI Rule Number
DPI Rule Name
Microsoft Internet Explorer OnMove Use After Free Vulnerability (CVE-2012-1529)
Microsoft Internet Explorer Event Listener Use After Free Vulnerability (CVE-2012-2546)
Microsoft Internet Explorer Layout Use After Free Vulnerability (CVE-2012-2548)
Malicious attacks have consistently been launched on weak points in the supply chain. Like all attacks, these will evolve into more advanced forms. Software development, with multiple phases that could be placed at risk, is particularly vulnerable.