Description
Multiple serious vulnerabilities have been found in Microsoft Internet Explorer. Malicious users can exploit these vulnerabilities to Bypass security restrictions, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Multiple memory corruption vulnerabilities can be exploited remotely via a specially designed web site to execute arbitrary code;
- Improper Address Space Layout Randomization usage can be exploited remotely via a specially designed website to bypass security restrictions;
- An unknown vulnerability can be exploited remotely via a specially designed file,
Technical details
To exploit (3) attacker must first leverage another vulnerability to cause code execution in IE with EPM. Than malicious can execute Excel, Notepad, PowerPoint or another with unsafe command line parameter. Another part of updates for this vulnerability listed in KLA10646, KLA10645
Original advisories
- CVE-2015-2449
- CVE-2015-2441
- CVE-2015-2446
- CVE-2015-2442
- CVE-2015-2448
- CVE-2015-2447
- CVE-2015-2444
- CVE-2015-2443
- CVE-2015-2450
- CVE-2015-2445
- CVE-2015-2452
- CVE-2015-2451
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2015-2423 warning
- CVE-2015-2449 warning
- CVE-2015-2441 critical
- CVE-2015-2446 critical
- CVE-2015-2442 critical
- CVE-2015-2448 critical
- CVE-2015-2447 critical
- CVE-2015-2444 critical
- CVE-2015-2443 critical
- CVE-2015-2450 critical
- CVE-2015-2445 warning
- CVE-2015-2452 critical
- CVE-2015-2451 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com