Vulnerability in Microsoft Internet Explorer Could Allow Remote Code Execution (MS15-093)

ITS Advisory Number: 
2015-101
Date(s) Issued: 
Wednesday, August 19, 2015
Subject: 
Vulnerability in Microsoft Internet Explorer Could Allow Remote Code Execution (MS15-093)
Overview: 

A vulnerability has been discovered in Microsoft's web browser, Internet Explorer. Successful exploitation of this vulnerability could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. A failed attempt at exploiting this vulnerability could cause a denial of service condition.

 

Systems Affected: 
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
High
Description: 

Microsoft Internet Explorer is prone to a memory corruption vulnerability, which could allow for remote code execution. The vulnerability exists when Internet Explorer improperly accesses objects in memory.

This vulnerability could allow an attacker to execute remote code by convincing a victim to visit a specially-crafted website. When the website is visited, the attacker's script will run with the same permissions as the affected user account. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. A failed attempt at exploiting this vulnerability could cause a denial of service condition.  

Actions: 
  • Apply updates from Microsoft, immediately after appropriate testing.
  • Remind users not to visit websites or follow links provided by unknown or untrusted sources.
  • Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from untrusted sources.