CVE ID | |
CVSS SCORE | 6.8, AV:N/AC:M/Au:N/C:P/I:P/A:P |
AFFECTED VENDORS |
Microsoft |
AFFECTED PRODUCTS |
Internet Explorer |
TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['16488']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com |
VULNERABILITY DETAILS |
The specific flaw exists within the handling of ScriptEngine objects. By manipulating a document's elements an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process.
|
ADDITIONAL DETAILS |
06/30/2014 - ZDI disclosed report to vendor -- Vendor Mitigation: For users who have not modified the default configuration for the "Disable script debugging (Internet Explorer)" option, no action is required. For users who have modified the default configuration, or want to verify the configuration, follow the steps below: 1.) In Internet Explorer, choose Internet Options from the Tools menu.
|
DISCLOSURE TIMELINE |
|
CREDIT | Aniway.Anyway@gmail.com |