First published: Wed Feb 11 2015(Updated: )
Microsoft Internet Explorer 9 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability."
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | ||
Internet Explorer | =9 | |
Internet Explorer | =10 | |
Internet Explorer | =11 | |
All of | ||
Internet Explorer | =9 | |
Any of | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Vista | =sp2 | |
All of | ||
Internet Explorer | =10 | |
Any of | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
All of | ||
Internet Explorer | =11 | |
Any of | ||
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0071 is classified as a critical vulnerability due to its capability to allow unauthorized remote code execution.
To fix CVE-2015-0071, apply the latest security updates from Microsoft for Internet Explorer.
CVE-2015-0071 affects Internet Explorer versions 9, 10, and 11.
Yes, CVE-2015-0071 can be exploited remotely through crafted websites.
CVE-2015-0071 bypasses the Address Space Layout Randomization (ASLR) protection mechanism.