Wednesday, September 19, 2012

Internet Cert advisory on Internet Explorer

Please read this:

National Cyber Awareness System

US-CERT Alert TA12-262A
Microsoft Security Advisory for Internet Explorer Exploit

Original release date: September 18, 2012
Last revised: --

Systems Affected

     * Microsoft Internet Explorer 7
     * Microsoft Internet Explorer 8
     * Microsoft Internet Explorer 9


Overview

   An unpatched use-after-free vulnerability in Microsoft Internet
   Explorer versions 7, 8, and 9 is being exploited in the wild.
   Microsoft has released Security Advisory 2757760 with mitigation
   techniques.


Description

   Microsoft Internet Explorer versions 7, 8, and 9 are susceptible to
   a use-after-free vulnerability. This vulnerability is being
   actively exploited in the wild. At this time, there is no patch
   available for this vulnerability. End-users can mitigate the
   vulnerability by using Microsoft's Enhanced Mitigation Experience
   Toolkit.

   Additional mitigation advice is available in the MSRC blog post:
   "Microsoft Releases Security Advisory 2757760" and US-CERT
   Vulnerability Note VU#480095.


Impact

   A remote, unauthenticated attacker could execute arbitrary code,
   cause a denial of service, or gain unauthorized access to your
   files or system.


Solution

   US-CERT recommends Internet Explorer users read Microsoft Security
   Advisory 2757760 and apply mitigation techniques such as using the
   Microsoft Enhanced Mitigation Experience Toolkit.


References

 * Microsoft Security Advisory (2757760)
   

 * MSRC Blog: Microsoft Releases Security Advisory 2757760
   

 * Download Microsoft EMET 3.0
   

 * US-CERT Vulnerability Note VU#480095
   


No comments: