Seven Critical Remote Code Execution Vulnerabilities Discovered in Internet Explorer
( Microsoft Security Bulletin MS13-021 )
Summary
Seven critical "use-after-free" vulnerabilities have been reported in Microsoft Internet Explorer. Successful exploitation of any of these issues could allow a remote attacker to execute arbitrary code on a targeted machine. The Check Point IPS Software Blade protects unpatched systems against all of these vulnerabilities.
Details
Multiple remote code execution vulnerabilities exist in the way that Internet Explorer accesses an object in memory that has been deleted. These vulnerabilities may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Solution
Check Point recommends deploying the updates described in MS13-021 as soon as is practical. In the meantime, the Check Point IPS Software Blade protects unpatched systems against these issues in the latest IPS update by detecting and blocking attempts to open malicious HTML files.
Please consult the following table for the brief descriptions of each vulnerability, the associated CVE number, and the applicable Check Point Protection. Each protection link includes information on the versions of Internet Explorer that are affected by a particular vulnerability.
| Internet Explorer Vulnerability | Industry Reference | Check Point Protection |
|---|---|---|
| CMarkupBehaviorContext use after free | CVE-2013-0089 | CPAI-2013-1328 |
| saveHistory Use After Free Code Execution | CVE-2013-0088 | CPAI-2013-1331 |
| CElement Use After Free Code Execution | CVE-2013-0091 | CPAI-2013-1332 |
| removeChild Use After Free Code Execution | CVE-2013-0094 | CPAI-2013-1337 |
| CCaret Use After Free Code Execution | CVE-2013-0090 | CPAI-2013-1593 |
| GetMarkupPtr Use After Free Code Execution | CVE-2013-0092 | CPAI-2013-1595 |
| CTreeNode Use After Free Remote Code Execution | CVE-2013-1288 | CPAI-2013-1598 |
Originally Published:
Last Updated: 14-Mar-2013