Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Web Browser)  >   Microsoft Internet Explorer Vendors:   Microsoft
Microsoft Internet Explorer Mulitple Flaws Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1031888
SecurityTracker URL:
CVE Reference:   CVE-2015-0032, CVE-2015-0056, CVE-2015-0072, CVE-2015-0099, CVE-2015-0100, CVE-2015-1622, CVE-2015-1623, CVE-2015-1624, CVE-2015-1625, CVE-2015-1626, CVE-2015-1627, CVE-2015-1634   (Links to External Site)
Date:  Mar 10 2015
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6, 7, 8, 9, 10, 11
Description:   Multiple vulnerabilities were reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the target user.

One vulnerability resides in the VBScript engine [CVE-2015-0032].

Bo Qu of Palo Alto Networks, 0016EECD9D7159A949DAD3BC17E0A939 (via HP's Zero Day Initiative), SkyLined (via HP's Zero Day Initiative), ca0nguyen (via HP's Zero Day Initiative), Arthur Gerkis (via HP's Zero Day Initiative), Ashutosh Mehra, and an anonymous researcher (via Beyond Security's SecuriTeam Secure Disclosure team) reported these vulnerabilities.

Impact:   A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix.

A patch matrix is available in the vendor's advisory.

[Editor's note: CVE-2015-0032 affects the VBScript scripting engine but is included in this fix for IE 8, 9, 10, and 11. A separate bulletin (MS15-019) includes the fix for IE 7.]

The Microsoft advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  Windows (Any)
Underlying OS Comments:  2003 SP2, Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1, 8, 8.1, 2012, 2012 R2, RT, RT 8.1; and prior service packs

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC