A remote code execution vulnerability exists in the following versions of Internet Explorer:
Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
The vulnerability may corrupt memory when Internet Explorer attempts to load an object that has already been deleted or can no longer be found in memory. When an attacker exploits this vulnerability, the attacker may execute code remotely. To exploit this vulnerability, an attacker must lure users to access a compromised website or a malicious webpage. The said site or webpage contains the code that exploits the vulnerability.
Note that users who are logged on a vulnerable system with privileges lesser than an administrator are less impacted. Also, this vulnerability does not exist on Internet Explorer 9 and 10.
TREND MICRO PROTECTION INFORMATION
Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.
MS Bulletin ID
DPI Rule Number
DPI Rule Name
Microsoft Internet Explorer CDwnBindInfo Object Use-After-Free Vulnerability (CVE-2012-4792)
Microsoft Internet Explorer CDwnBindInfo Object Use-After-Free Vulnerability (CVE-2012-4792) Obfuscated
Administrators of NGINX web servers running PHP-FPM are advised to patch a vulnerability (CVE-2019-11043) that can let threat actors execute remote code on vulnerable, NGINX-enabled web servers. Here’s what you need to know.