HTTP: Microsoft Internet Explorer 8 Object Memory Corruption
This signature detects attempts to exploit a known vulnerability in the Microsoft Internet Explorer 8. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.
Extended Description
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
Affected Products
Microsoft internet_explorer
References
BugTraq: 59752
CVE: CVE-2013-1311
URL: http://technet.microsoft.com/security/bulletin/ms13-037
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Microsoft
9.3