Navigation
Recherche
|
Microsoft Issues Emergency Fix For Internet Explorer Zero Day
vendredi 21 décembre 2018, 14:00 , par Slashdot
An anonymous reader quotes a report from Bleeping Computer: Microsoft has released an out-of-band security update that fixes an actively exploited vulnerability in Internet Explorer. This vulnerability has been assigned ID CVE-2018-8653 and was discovered by Google's Threat Analysis Group when they saw the vulnerability being used in targeted attacks. According to Microsoft's security bulletin this is vulnerability in how the Internet Explorer scripting engine handles objects in memory. Attackers can use this vulnerability to corrupt memory in such a way that attackers could execute code under the security privileges of the logged in user. This vulnerability can also be used to launch attacks through specially crafted web sites that utilize the exploit code. This means that attackers can utilize this feature in exploit kits or by compromising legitimate sites and adding code that exploits the vulnerability.
'A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer,' states Microsoft's advisory. 'The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.' Read more of this story at Slashdot.
rss.slashdot.org/~r/Slashdot/slashdot/~3/4jH38mBScYA/microsoft-issues-emergency-fix-for-internet-exp...
|
56 sources (32 en français)
Date Actuelle
ven. 22 nov. - 04:54 CET
|