{"id":72725,"date":"2010-11-04T06:15:01","date_gmt":"2010-11-04T06:15:01","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=72725"},"modified":"2010-11-04T06:15:01","modified_gmt":"2010-11-04T06:15:01","slug":"vulnerability-in-internet-explorer-could-allow-remote-code-execution-2458511","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/vulnerability-in-internet-explorer-could-allow-remote-code-execution-2458511\/","title":{"rendered":"Vulnerability in Internet Explorer Could Allow Remote Code Execution (2458511)"},"content":{"rendered":"<div><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/archive\/microsoft-internet-explorer-8.serendipityThumb.jpg\" alt=\"\" width=\"110\" height=\"73\" \/>Remote code execution vulnerability exists in all supported versions of Internet Explorer. The vulnerability exists due to an invalid flag reference within Internet Explorer. It is possible under certain conditions for the invalid flag reference to be accessed after an object is deleted. In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution. Exploitation requires a user to visit a malicious web page.<\/p>\n<p>Affected Software<\/p>\n<p>Internet Explorer 6<br \/>\nWindows XP Service Pack 3 Internet Explorer 6<br \/>\nWindows XP Professional x64 Edition Service Pack 2 Internet Explorer 6<br \/>\nWindows Server 2003 Service Pack 2 Internet Explorer 6<br \/>\nWindows Server 2003 x64 Edition Service Pack 2 Internet Explorers 6<br \/>\nWindows Server 2003 with SP2 for Itanium-based Systems Internet Explorer 6<\/p>\n<p>Internet Explorer 7<br \/>\nWindows XP Service Pack 3 Internet Explorer 7<br \/>\nWindows XP Professional x64 Edition Service Pack 2 Internet Explorer 7<br \/>\nWindows Server 2003 Service Pack 2 Internet Explorer 7<br \/>\nWindows Server 2003 x64 Edition Service Pack 2 Internet Explorers 7<br \/>\nWindows Server 2003 with SP2 for Itanium-based Systems Internet Explorer 7<br \/>\nWindows Vista Service Pack 1 and Windows Vista Service Pack 2 Internet Explorers 7<br \/>\nWindows Vista x64 Edition Service Pack 1 and Internet Explorer 7<br \/>\nWindows Vista x64 Edition Service Pack 2<br \/>\nWindows Server 2008 for 32-bit Systems and Internet Explorer 7<br \/>\nWindows Server 2008 for 32-bit Systems Service Pack 2<br \/>\nWindows Server 2008 for x64-based Systems and Internet Explorer 7<br \/>\nWindows Server 2008 for x64-based Systems Service Pack 2<br \/>\nWindows Server 2008 for Itanium-based Systems and Internet Explorer 7<br \/>\nWindows Server 2008 for Itanium-based Systems Service Pack 2<\/p>\n<p>Internet Explorer 8<br \/>\nWindows XP Service Pack 3 Internet Explorer 8<br \/>\nWindows XP Professional x64 Edition Service Pack 2 Internet Explorer 8<br \/>\nWindows Server 2003 Service Pack 2 Internet Explorer 8<br \/>\nWindows Server 2003 x64 Edition Service Pack 2 Internet Explorer 8<br \/>\nWindows Vista Service Pack 1 and Windows Vista Service Pack 2 Internet Explorers 8<br \/>\nWindows Vista x64 Edition Service Pack 1 and Internet Explorer 8<br \/>\nWindows Vista x64 Edition Service Pack 2<br \/>\nWindows Server 2008 for 32-bit Systems and Internet Explorer 8<br \/>\nWindows Server 2008 for 32-bit Systems Service Pack 2<br \/>\nWindows Server 2008 for x64-based Systems and Internet Explorer 8<br \/>\nWindows Server 2008 for x64-based Systems Service Pack 2<br \/>\nWindows 7 for 32-bit Systems Internet Explorer 8<br \/>\nWindows 7 for x64-based Systems Internet Explorer 8<br \/>\nWindows Server 2008 R2 for x64-based Systems Internet Explorer 8<br \/>\nWindows Server 2008 R2 for Itanium-based Systems Internet Explorer 8<\/p>\n<p>The vendor has released a mitigation process for this issue:<br \/>\nhttps:\/\/support.microsoft.com\/kb\/2458511<\/p>\n<p>For detailed information please go through the below link,<br \/>\nhttps:\/\/www.microsoft.com\/technet\/security\/advisory\/2458511.mspx<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Remote code execution vulnerability exists in all supported versions of Internet Explorer. The vulnerability exists due to an invalid flag reference within Internet Explorer. It is possible under certain conditions for the invalid flag reference to be accessed after an object is deleted. In a specially-crafted attack, in attempting to access a freed object, Internet [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-72725","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72725"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=72725"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72725\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=72725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=72725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=72725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}