Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SCAN:METASPLOIT:EXECCOMMAND-UAF

Severity

High

Recommended

Yes

Recommended Action

Drop

Category

SCAN

Keywords

IE MSF MetaSploit Framework CMshtmlEd

Release Date

2012/09/17

Update Number

2185

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SCAN: Metasploit ie_execcommand_uaf Exploit


This signature detects the MetaSploit Framework module 'ie_execcommand_uaf' as it attempts to exploit a zero-day vulnerability in Internet Explorer. Internet Explorer is vulnerable to a remote code execution exploit due to a use-after-free error in the CMshtmlEd::Exec() function. A successful exploit may result in arbitrary code execution as the user.

References

  • BugTraq: 55562
  • URL: http://eromang.zataz.com/2012/09/16/zero-day-season-is-really-not-over-yet/
  • URL: http://labs.alienvault.com/labs/index.php/2012/new-internet-explorer-zero-day-being-exploited-in-the-wild/
  • URL: http://technet.microsoft.com/en-us/security/advisory/2757760

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out