First published: Tue Apr 10 2012(Updated: )
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "SelectAll Remote Code Execution Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =6 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Internet Explorer | =7 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Internet Explorer | =8 | |
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2-sp1 | |
Internet Explorer | =9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0171 has a critical severity rating due to its potential to allow remote code execution.
To fix CVE-2012-0171, you should apply the relevant security update provided by Microsoft.
CVE-2012-0171 affects Internet Explorer versions 6, 7, 8, and 9.
Yes, CVE-2012-0171 can be exploited remotely by attackers through malicious web pages.
Symptoms of exploitation may include abnormal behavior of the application, system crashes, or unexpected web browser activity.