US-CERT Alert TA12-262A - Microsoft Security Advisory for Internet Explorer Exploit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


(追記) (追記ここまで)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Awareness System
US-CERT Alert TA12-262A
Microsoft Security Advisory for Internet Explorer Exploit
Original release date: September 18, 2012
Last revised: --
Systems Affected
 * Microsoft Internet Explorer 7
 * Microsoft Internet Explorer 8
 * Microsoft Internet Explorer 9
Overview
 An unpatched use-after-free vulnerability in Microsoft Internet
 Explorer versions 7, 8, and 9 is being exploited in the wild.
 Microsoft has released Security Advisory 2757760 with mitigation
 techniques.
Description
 Microsoft Internet Explorer versions 7, 8, and 9 are susceptible to
 a use-after-free vulnerability. This vulnerability is being
 actively exploited in the wild. At this time, there is no patch
 available for this vulnerability. End-users can mitigate the
 vulnerability by using Microsoft's Enhanced Mitigation Experience
 Toolkit.
 Additional mitigation advice is available in the MSRC blog post:
 "Microsoft Releases Security Advisory 2757760" and US-CERT
 Vulnerability Note VU#480095.
Impact
 A remote, unauthenticated attacker could execute arbitrary code,
 cause a denial of service, or gain unauthorized access to your
 files or system.
Solution
 US-CERT recommends Internet Explorer users read Microsoft Security
 Advisory 2757760 and apply mitigation techniques such as using the
 Microsoft Enhanced Mitigation Experience Toolkit.
References
 * Microsoft Security Advisory (2757760)
 <http://technet.microsoft.com/en-us/security/advisory/2757760>
 * MSRC Blog: Microsoft Releases Security Advisory 2757760
 <http://blogs.technet.com/b/msrc/archive/2012/09/17/microsoft-releases-security-advisory-2757760.aspx>
 * Download Microsoft EMET 3.0
 <http://www.microsoft.com/en-us/download/details.aspx?id=29851>
 * US-CERT Vulnerability Note VU#480095
 <http://www.kb.cert.org/vuls/id/480095>
Revision History
 September 18, 2012: Initial release
 ____________________________________________________________________
 Feedback can be directed to US-CERT Technical Staff. Please send
 email to <cert@xxxxxxxx> with "TA12-262A Feedback VU#480095" in
 the subject.
 ____________________________________________________________________
 Produced by US-CERT, a government organization.
 ____________________________________________________________________
This product is provided subject to this Notification: 
http://www.us-cert.gov/privacy/notification.html
Privacy & Use policy: 
http://www.us-cert.gov/privacy/
This document can also be found at
http://www.us-cert.gov/cas/techalerts/TA12-262A.html
For instructions on subscribing to or unsubscribing from this 
mailing list, visit http://www.us-cert.gov/cas/signup.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBUFjR/XdnhE8Qi3ZhAQKbYgf/ea8sgQoPJhjLd95pO0Xqejz+82rgVVFX
jiEAZcKpNygrCdh5NKNsEuZXQvsn4bew+pg3jgf5mplXLtl05WrOukZ7SL74GQjy
LFNPeRZ+nB8q6KwIEAGoeDFkewZqdzV0ro/z/ttMHjtbSteHoa9hrYqrwqPURZT0
JgGmth33YDV0VK1KZkgmD15mA1CMAPwbdVqL3WdznR/Dm9HyXi1XkRemA5TmBH8j
TpiMbHoUFZm79ZC/PbjE07NVZm5YNoTrWBZpebhsDssgnfBnL6J2BTtKeBKMVMcb
NNul23iMf7ydy6FjAvDmhmQ9A7WMyky+SFavYTr5GsXN8AkDhuOrJA==
=K/5z
-----END PGP SIGNATURE-----

[Index of Archives] [Fedora Announce] [Linux Crypto] [Kernel] [Netfilter] [Bugtraq] [USB] [Fedora Security]

(追記) (追記ここまで)
Powered by Linux

AltStyle によって変換されたページ (->オリジナル) /