tagline: Confidence in the Connected World
CIS Logo
HomeResourcesAdvisoriesVulnerability in Microsoft Internet Explorer Could Allow Remote Code Execution (MS15-093)

Vulnerability in Microsoft Internet Explorer Could Allow Remote Code Execution (MS15-093)

MS-ISAC ADVISORY NUMBER:

2015-102

DATE(S) ISSUED:

08/18/2015

OVERVIEW:

A vulnerability has been discovered in Microsoft's web browser, Internet Explorer. Successful exploitation of this vulnerability could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. A failed attempt at exploiting this vulnerability could cause a denial of service condition.

THREAT INTELLIGENCE:

There are reports of this vulnerability being exploited in the wild.

SYSTEMS AFFECTED:

  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11

RISK:

Government:
  • Large and medium government entities: HIGH
  • Small government entities: HIGH
Businesses:
  • Large and medium business entities: HIGH
  • Small business entities: HIGH
Home Users:
HIGH

TECHNICAL SUMMARY:

Microsoft Internet Explorer is prone to a memory corruption vulnerability, which could allow for remote code execution. The vulnerability exists when Internet Explorer improperly accesses objects in memory.

This vulnerability could allow an attacker to execute remote code by convincing a victim to visit a specially-crafted website. When the website is visited, the attacker's script will run with the same permissions as the affected user account. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. A failed attempt at exploiting this vulnerability could cause a denial of service condition.

RECOMENDATIONS:

We recommend the following actions be taken:

Apply updates from Microsoft, immediately after appropriate testingRemind users not to visit websites or follow links provided by unknown or untrusted sources.
Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from untrusted sources.

REFERENCES:

Get Email Updates When Cyber Threats Like This Arise

Arrow Subscribe to Advisories