Microsoft reports a vulnerability that exists in several versions of Microsoft XML Core Services. The vulnerability exists when MSXML attempts to access an object in memory that is not present. Attackers who attempt to exploit the said vulnerability must lure potential targets to view a specially crafted webpage using Internet Explorer. Typically, attackers may use social engineering lures to get users to click on a link contained in an email or an instant message. Attackers who successfully exploit this vulnerability may execute code on the affected system.
Note that Microsoft specifies that Internet Explorer on the following Windows operating systems successfully mitigates this vulnerability:
Trend Micro Deep Security shields customers from this vulnerability using the specified rule below. Trend Micro customers using OfficeScan with the Intrusion Defense Firewall plugin are also protected from attacks using this vulnerability.
|MS Bulletin ID||Vulnerability ID||DPI Rule Number||DPI Rule Name||Release Date||IDF Compatibility|
|CVE-2012-1889||1005061||Microsoft Internet XML Core Services Remote Code Execution Vulnerability (CVE-2012-1889)||12-Jun-12||YES|