Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:IE:EMBED-MC

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Microsoft Internet Explorer EMBED Element Memory Corruption

Release Date

2011/07/21

Update Number

1959

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Microsoft Internet Explorer EMBED Element Memory Corruption


This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer EMBED Element. A successful attack can lead to arbitrary code execution.

Extended Description

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise the application and possibly the computer. Failed attacks may cause denial-of-service conditions.

Affected Products

  • Avaya Messaging Application Server MM 1.1
  • Avaya Messaging Application Server MM 2.0
  • Avaya Messaging Application Server MM 3.0
  • Avaya Messaging Application Server MM 3.1
  • Avaya Messaging Application Server
  • Microsoft Internet Explorer 6.0
  • Microsoft Internet Explorer 6.0 SP1
  • Microsoft Internet Explorer 7.0
  • Nortel Networks CallPilot 1002Rp
  • Nortel Networks CallPilot 1005R
  • Nortel Networks CallPilot 201I
  • Nortel Networks CallPilot 600R
  • Nortel Networks CallPilot 703T

References

  • BugTraq: 34424
  • CVE: CVE-2009-0553

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out