First published: Wed May 13 2015(Updated: )
The Microsoft (1) VBScript 5.6 through 5.8 and (2) JScript 5.6 through 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "VBScript and JScript ASLR Bypass."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =8 | |
Internet Explorer | =9 | |
Internet Explorer | =10 | |
Internet Explorer | =11 | |
Microsoft VBScript | =5.6 | |
Microsoft VBScript | =5.7 | |
Microsoft VBScript | =5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1686 has a critical severity rating due to its potential to allow remote code execution.
To fix CVE-2015-1686, you should apply the security update provided by Microsoft for your affected version of Internet Explorer or VBScript.
CVE-2015-1686 affects Internet Explorer versions 8, 9, 10, and 11.
Yes, CVE-2015-1686 can be exploited remotely via a specially crafted website.
The primary impact of CVE-2015-1686 is the potential bypass of Address Space Layout Randomization (ASLR) protection, enabling further attacks.