First published: Tue Sep 18 2012(Updated: )
Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | ||
All of | ||
Internet Explorer | =6 | |
Any of | ||
Microsoft Windows Server | =2003-sp2 | |
Microsoft Windows Server | =2003-sp2 | |
Microsoft Windows Server | =2003-sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
All of | ||
Internet Explorer | =7 | |
Any of | ||
Microsoft Windows Server | =2003-sp2 | |
Microsoft Windows Server | =2003-sp2 | |
Microsoft Windows Server | =2003-sp2 | |
Microsoft Windows Server | =2008-sp2 | |
Microsoft Windows Server | =2008-sp2 | |
Microsoft Windows Server | =2008-sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
All of | ||
Internet Explorer | =8 | |
Any of | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =2003-sp2 | |
Microsoft Windows Server | =2003-sp2 | |
Microsoft Windows Server | =2008-sp2 | |
Microsoft Windows Server | =2008-sp2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp3 | |
Microsoft Windows XP | =sp2 | |
All of | ||
Internet Explorer | =9 | |
Any of | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Internet Explorer | =6 | |
Microsoft Windows Server | =2003-sp2 | |
Microsoft Windows Server | =2003-sp2 | |
Microsoft Windows Server | =2003-sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 | |
Internet Explorer | =7 | |
Microsoft Windows Server | =2008-sp2 | |
Microsoft Windows Server | =2008-sp2 | |
Microsoft Windows Server | =2008-sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Internet Explorer | =8 | |
Microsoft Windows 7 | ||
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =r2-sp1 | |
Internet Explorer | =9 | |
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 7 | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4969 is a critical vulnerability that allows remote code execution through a use-after-free condition in Microsoft Internet Explorer.
To fix CVE-2012-4969, users should update Microsoft Internet Explorer to the latest version available from Microsoft.
CVE-2012-4969 affects Microsoft Internet Explorer versions 6 through 9.
CVE-2012-4969 can be exploited by attackers through specially crafted web pages that can lead to arbitrary code execution.
While patching is the best solution, users can mitigate CVE-2012-4969 by avoiding the use of affected Internet Explorer versions and using alternative browsers.