HTTP: Microsoft Internet Explorer Deleted Table Object Memory Corruption
This signature detects attempts to exploit a known memory corruption vulnerability in Microsoft Internet Explorer. A successful exploit can result in arbitrary code execution with privileges of the targeted user.
Extended Description
Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise the application and possibly the computer. Failed attacks may cause denial-of-service conditions.
Affected Products
Nortel_networks self-service_media_processing_server,Microsoft internet_explorer
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Nortel_networks
Microsoft
Avaya
9.3