HTTP: Microsoft Internet Explorer Table Column Memory Corruption
This signature detects attempts to exploit a known vulnerability in Microsoft Internet Explorer. An attacker can create a Web site with Web pages containing dangerous HTML elements, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.
Extended Description
Microsoft Internet Explorer is prone to a remote code-execution vulnerability. This vulnerability is related to how the browser handles uninitialized or deleted objects. An attacker could exploit this issue to execute arbitrary code in the context of the user running the affected browser.
Affected Products
Avaya messaging_application_server,Microsoft internet_explorer
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Nortel_networks
Avaya
Microsoft
9.3