Microsoft Internet Explorer Execute Arbitrary Code Remote Memory Corruption Vulnerabilities
The information has been provided by Jason Kratzer, working with HP’s Zero Day Initiative .
* Microsoft Internet Explorer 8 and 9
Microsoft Internet Explorer is prone to a remote memory-corruption vulnerability. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Original release date: 11/11/2014
Last revised: 12/30/2014