First published: Wed Dec 12 2012(Updated: )
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =6 | |
Internet Explorer | =7 | |
Internet Explorer | =8 | |
Internet Explorer | =9 | |
Internet Explorer | =10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4781 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2012-4781, you should apply the security updates provided by Microsoft for Internet Explorer versions 6 through 10.
CVE-2012-4781 affects users of Microsoft Internet Explorer versions 6, 7, 8, 9, and 10.
Attackers can leverage CVE-2012-4781 through crafted web pages that exploit the use-after-free vulnerability to execute arbitrary code.
Microsoft has ended support for Internet Explorer versions that are affected by CVE-2012-4781, increasing the risk for users who continue to use these versions.