First published: Wed Aug 10 2011(Updated: )
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Style Object Memory Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =6 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Internet Explorer | =7 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Vista | =sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Internet Explorer | =8 | |
Microsoft Windows 7 | ||
Microsoft Windows Server 2008 Itanium | =r2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Internet Explorer | =9 | |
Microsoft Windows 7 | =sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1964 has a critical severity level due to its potential for remote code execution.
To fix CVE-2011-1964, you should apply the latest security updates provided by Microsoft for Internet Explorer.
CVE-2011-1964 affects Internet Explorer versions 6, 7, 8, and 9.
Yes, CVE-2011-1964 can be exploited by remote attackers through specially crafted web content.
CVE-2011-1964 allows attackers to execute arbitrary code on vulnerable systems leading to potential system compromise.