First published: Wed Aug 10 2011(Updated: )
Microsoft Internet Explorer 7 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "XSLT Memory Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =7 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Internet Explorer | =8 | |
Microsoft Windows 7 | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2-sp1 | |
Internet Explorer | =9 | |
Microsoft Windows 7 | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1963 is rated as critical due to the potential for remote code execution.
To remediate CVE-2011-1963, apply the security updates provided by Microsoft for Internet Explorer.
CVE-2011-1963 affects Microsoft Internet Explorer versions 7, 8, and 9.
CVE-2011-1963 can be exploited via specially crafted web pages that execute malicious code.
Disabling Active Scripting in Internet Explorer can serve as a temporary workaround for CVE-2011-1963.