First published: Tue Jul 10 2012(Updated: )
Microsoft Internet Explorer 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Cached Object Remote Code Execution Vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Internet Explorer | =9 | |
Any of | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Vista | =sp2 | |
Internet Explorer | =9 | |
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1522 has a severity rating that allows remote code execution, potentially leading to severe system compromise.
To fix CVE-2012-1522, users should update to the latest version of Microsoft Internet Explorer or apply the relevant security patches provided by Microsoft.
CVE-2012-1522 specifically affects Internet Explorer 9.
CVE-2012-1522 is classified as a remote code execution vulnerability due to improper memory handling.
CVE-2012-1522 affects systems running Windows 7, Windows Vista, and Windows Server versions that utilize Internet Explorer 9.