Internet Explorer Memory Corruption Vulnerability - CVE-2017-8547ID: oval:org.secpod.oval:def:40978 | Date: (C)2017-06-15 (M)2024-03-06 |
Class: VULNERABILITY | Family: windows |
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. This vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer, and then convince a user to view the website.The attacker could also take advantage of compromised websites, and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability.The update addresses the vulnerability by modifying how Internet Explorer handles objects in memory.
Platform: |
Microsoft Windows 10 |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Server 2016 |
Product: |
Internet Explorer 10 |
Internet Explorer 11 |