First published: Thu Jun 16 2011(Updated: )
The Timed Interactive Multimedia Extensions (aka HTML+TIME) implementation in Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Time Element Memory Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =6 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Internet Explorer | =7 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Internet Explorer | =8 | |
Microsoft Windows 7 | ||
Microsoft Windows Server | =r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1255 has a high severity rating due to its potential for remote code execution.
To fix CVE-2011-1255, users should upgrade to a supported version of Internet Explorer or apply the latest security patches provided by Microsoft.
CVE-2011-1255 affects Internet Explorer versions 6, 7, and 8.
Yes, CVE-2011-1255 can be exploited remotely by attackers through malicious webpages.
While the best solution is to update software, disabling Active Scripting in Internet Explorer can serve as a temporary workaround for CVE-2011-1255.