Vulnerability in Microsoft Internet Explorer Could Allow Remote Code Execution (MS15-093)
MS-ISAC ADVISORY NUMBER:2015-102
A vulnerability has been discovered in Microsoft's web browser, Internet Explorer. Successful exploitation of this vulnerability could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. A failed attempt at exploiting this vulnerability could cause a denial of service condition.
There are reports of this vulnerability being exploited in the wild.
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Large and medium government entities: HIGH
- Small government entities: HIGH
- Large and medium business entities: HIGH
- Small business entities: HIGH
Microsoft Internet Explorer is prone to a memory corruption vulnerability, which could allow for remote code execution. The vulnerability exists when Internet Explorer improperly accesses objects in memory.
This vulnerability could allow an attacker to execute remote code by convincing a victim to visit a specially-crafted website. When the website is visited, the attacker's script will run with the same permissions as the affected user account. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. A failed attempt at exploiting this vulnerability could cause a denial of service condition.
We recommend the following actions be taken:
Apply updates from Microsoft, immediately after appropriate testingRemind users not to visit websites or follow links provided by unknown or untrusted sources.
Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from untrusted sources.