First published: Wed Oct 14 2015(Updated: )
The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "VBScript and JScript ASLR Bypass."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft JScript | =5.7 | |
Microsoft JScript | =5.8 | |
Microsoft VBScript | =5.7 | |
Microsoft VBScript | =5.8 | |
Internet Explorer | =8 | |
Internet Explorer | =9 | |
Internet Explorer | =10 | |
Internet Explorer | =11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6052 is classified as critical due to its potential for exploitation and impact on system security.
To fix CVE-2015-6052, apply the relevant Microsoft security updates for VBScript and JScript as outlined in the official bulletins.
CVE-2015-6052 affects Microsoft VBScript and JScript engines, and Internet Explorer versions 8 through 11.
Yes, CVE-2015-6052 allows remote attackers to bypass ASLR by leveraging a crafted website.
Systems running unpatched versions of Internet Explorer 8, 9, 10, or 11 are at higher risk for exploitation of CVE-2015-6052.