Дата обнаружения
|
08/09/2015 |
Уровень угрозы
|
Critical |
Описание
|
Multiple serious vulnerabilities have been found in Internet Explorer. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges or obtain sensitive information. Below is a complete list of vulnerabilities
Technical details Vulnerability (2) doesn’t itself allow arbitrary code execution but combined with another vulnerability could be exploited to run arbitrary code with elevated privileges. Exploitation of vulnerability (3) could lead to disclosure of memory content. (4) caused by accessing files with improper flag and can lead low privilege process to delete arbitrary files. |
Пораженные продукты
|
Internet Explorer versions from 7 through 11 |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2015-2483 CVE-2015-2493 CVE-2015-2492 CVE-2015-2490 CVE-2015-2501 CVE-2015-2494 CVE-2015-2500 CVE-2015-2489 CVE-2015-2541 CVE-2015-2542 CVE-2015-2491 CVE-2015-2499 CVE-2015-2498 CVE-2015-2486 CVE-2015-2485 CVE-2015-2484 CVE-2015-2487 |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
SB
[?]
WLF
[?]
PE
[?]
|
Связанные продукты
|
Microsoft Internet Explorer |
CVE-IDS
|
CVE-2015-24835.0Critical
CVE-2015-24939.3Critical CVE-2015-24929.3Critical CVE-2015-24909.3Critical CVE-2015-25019.3Critical CVE-2015-24949.3Critical CVE-2015-25009.3Critical CVE-2015-24894.3Warning CVE-2015-25419.3Critical CVE-2015-25429.3Critical CVE-2015-24919.3Critical CVE-2015-24999.3Critical CVE-2015-24989.3Critical CVE-2015-24869.3Critical CVE-2015-24859.3Critical CVE-2015-24846.4High CVE-2015-24879.3Critical |