Short Name |
HTTP:STC:IE:TIME-ELEMENT |
---|---|
Severity |
High |
Recommended |
No |
Category |
HTTP |
Keywords |
Microsoft Internet Explorer HTML Time Element Memory Corruption |
Release Date |
2011/01/26 |
Update Number |
1854 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known memory corruption vulnerability in Microsoft Internet Explorer. It is due to an error when accessing an object that has been incorrectly initialized or deleted. A remote attacker can exploit this by enticing a target user to open a maliciously crafted HTML document. In a successful attack where code is injected, the behavior of the target host is entirely dependent on the intended function of the injected code. The injected code would execute within the security context of the currently logged in user. In an unsuccessful attack, the vulnerable application can terminate abnormally.
Microsoft Internet Explorer is prone to a remote memory-corruption vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions.