Microsoft Internet Explorer 8 Remote Memory Corruption Vulnerabilities

Summary

Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka ‘Internet Explorer Memory Corruption Vulnerability.’

Credit:

Details

Vulnerable Systems:
 * Microsoft Internet Explorer 8

Immune Systems:
 * Microsoft Internet Explorer after 8

Microsoft Internet Explorer is prone to a remote memory-corruption vulnerability. Successfully exploiting this issue may allow attackers to execute arbitrary code in the context of the application. Failed exploit attempts will result in denial-of-service conditions.

CVE Information:
CVE-2014-2824

Disclosure Timeline:
Original release date: 08/12/2014
Last revised: 08/13/2014

Categories: Windows