First published: Fri Sep 21 2012(Updated: )
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "OnMove Use After Free Vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =8 | |
Internet Explorer | =8-beta1 | |
Internet Explorer | =8-beta2 | |
Internet Explorer | =8-rc1 | |
Internet Explorer | =9 | |
Internet Explorer | =9-beta1 | |
Internet Explorer | =9-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1529 has a critical severity rating due to its potential for remote code execution.
To fix CVE-2012-1529, users should upgrade to the latest version of Internet Explorer or apply the security patches provided by Microsoft.
CVE-2012-1529 affects Internet Explorer 8 and 9, including their beta and release candidate versions.
CVE-2012-1529 is classified as a use-after-free vulnerability.
CVE-2012-1529 can be exploited by attackers through a crafted website that accesses deleted or uninitialized objects.