HTTP: Microsoft Internet Explorer History.go Method Double Free Memory Corruption

This signature detects attempts to exploit a known vulnerability in Microsoft Internet Explorer. It is due to a double-free condition when processing malicious script that manipulates the history object. An attacker can persuade the target user to open a malicious web page to exploit this vulnerability. In an attack scenario, where arbitrary code is injected and executed on the target system, the behaviour of the target is dependent on the intention of the malicious code. The injected code will be run with privileges of the currently logged on user. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access.

Extended Description

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise the application and possibly the computer. Failed attacks may cause denial-of-service conditions.

Affected Products

Avaya messaging_application_server,Microsoft internet_explorer

References

BugTraq: 34423

CVE: CVE-2009-0552

Short Name
HTTP:STC:IE:HISTORY-GO-MC
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2009-0552 Corruption Double Explorer Free History.go Internet Memory Method Microsoft bid:34423
Release Date
08/03/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Nortel_networks

Microsoft

Avaya

CVSS Score

9.3

Found a potential security threat?