Bulletins‎ > ‎

Bulletin-0005: Security Vulnerability in Internet Explorer

General Information


Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11.

The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.

For further information on the Security Vulnerability please refer to https://technet.microsoft.com/en-US/library/security/2963983


Mitigation Strategies:

Microsoft Internet Explorer users who are concerned about this vulnerability can follow these mitigation steps:

  • Apply the updates from Microsoft as soon as they become available.
  • Do not use Microsoft Internet Explorer until the patch for this vulnerability has been installed.