21 SEP 2012
This security update addresses one publicly disclosed and four privately reported vulnerabilities in Internet Explorer versions 6, 7, 8, and 9. The most severe of the vulnerabilities was found able to allow arbitrary code execution when exploited. This same vulnerability was earlier reported to have been used in targeted attacks and leading to remote access tools (RATs).
Additional details of the mentioned vulnerability can be found here:
Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.
|MS Bulletin ID||Vulnerability ID||DPI Rule Number||DPI Rule Name||Release Date||IDF Compatibility|
|MS12-063||CVE-2012-1529||1005200||Microsoft Internet Explorer OnMove Use After Free Vulnerability (CVE-2012-1529)||24-Sep-12||YES|
|CVE-2012-2546||1005201||Microsoft Internet Explorer Event Listener Use After Free Vulnerability (CVE-2012-2546)||24-Sep-12||YES|
|CVE-2012-2548||1005199||Microsoft Internet Explorer Layout Use After Free Vulnerability (CVE-2012-2548)||24-Sep-12||YES|