CERT-In Vulnerability Note
CIVN-2012-0113
Remote Code Execution Vulnerabilities in Internet Explorer
Original Issue Date:December 12, 2012
Severity Rating: HIGH
Systems Affected
- Windows Vista Service Pack 2
- Windows Vista x64 Edition Service Pack 2
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows Server 2008 for x64-based Systems Service Pack 2
- Windows 7 for 32-bit Systems
- Windows 7 for 32-bit Systems Service Pack 1
- Windows 7 for x64-based Systems
- Windows 7 for x64-based Systems Service Pack 1
- Windows Server 2008 R2 for x64-based Systems
- Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Windows 8 for 32-bit Systems
- Windows 8 for 64-bit Systems
- Windows Server 2012
Component Affected
- Internet Explorer 9
- Internet Explorer 10
Overview
Multiple vulnerabilities have been reported in the Microsoft Internet Explorer, which could be exploited by remote attackers to execute arbitrary code to take control of the affected system affected in the context of currently logged-in user
Description
1. InjectHTMLStream Use After Free Vulnerability
(
CVE-2012-4781
)
This vulnerability exists in the Microsoft Internet Explorer while handling the access request for objects that has been deleted. A remote attacker could exploit the vulnerability by hosting specially crafted HTML file on a website and enticing a user to visit the website and open the crafted HTML file . Successful exploitation of the vulnerability results in memory corruption which allows a remote attacker to execute arbitrary code on the target system Workarounds - Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones
- Add sites that you trust to the Internet Explorer Trusted sites zone
- Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone
2. CMarkup Use After Free Vulnerability
(
CVE-2012-4782
)
This vulnerability exists in the Microsoft Internet Explorer while handling malicious input in HTML content.of a web page. A remote attacker could exploit the vulnerability by hosting specially crafted HTML file on a website and enticing a user to visit the website and open the crafted HTML file . Successful exploitation of the vulnerability results in memory corruption which allows attacker to execute arbitrary code on the target system Workarounds - Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones
- Add sites that you trust to the Internet Explorer Trusted sites zone
- Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone
3. Improper Ref Counting Use After Free Vulnerability
(
CVE-2012-4787
)
This vulnerability exists in the Microsoft Internet explorer due to an error while handling the access request for memory resources for those objects that has not been correctly initialized or has been deleted. A remote attacker could exploit the vulnerability by hosting specially crafted HTML file on a website and enticing a user to visit the website and open the crafted HTML file . Successful exploitation of the vulnerability results in memory corruption which allows attacker to execute arbitrary code on the target system Workarounds - Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones
- Add sites that you trust to the Internet Explorer Trusted sites zone
- Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS12-077
Vendor Information
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms12-077
References
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms12-077
CISCO
http://tools.cisco.com/security/center/viewAlert.x?alertId=27532
http://tools.cisco.com/security/center/viewAlert.x?alertId=27533
http://tools.cisco.com/security/center/viewAlert.x?alertId=27534
CVE Name
CVE-2012-4781
CVE-2012-4782
CVE-2012-4787
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|