First published: Thu Jun 16 2011(Updated: )
The Vector Markup Language (VML) implementation in vgx.dll in Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "VML Memory Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =6 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Internet Explorer | =7 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Internet Explorer | =8 | |
Microsoft Windows 7 | ||
Microsoft Windows Server 2008 Itanium | =r2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-1266 is considered critical due to its potential to allow remote code execution.
To fix CVE-2011-1266, users should apply the security updates provided by Microsoft for affected versions of Internet Explorer.
CVE-2011-1266 affects Microsoft Internet Explorer versions 6, 7, and 8.
Yes, CVE-2011-1266 can lead to system compromise, allowing attackers to execute arbitrary code on the system.
The best workaround for CVE-2011-1266 is to disable VML support in Internet Explorer, though this is not a complete mitigation.