CERTA-2012-ALE-006
Vulnerability from certfr_alerte - Published: - Updated:
Une vulnérabilité a été découverte dans Microsoft Internet Explorer. Elle permet une exécution de code arbitraire à distance au moyen d'une page Web spécialement conçue. Cette vulnérabilité est activement exploitée et largement diffusée.
Solution
Appliquer le correctif de Microsoft MS12-063 (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Internet Explorer 8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Internet Explorer 7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Internet Explorer 9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Internet Explorer 6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"closed_at": "2012-09-21",
"content": "## Solution\n\nAppliquer le correctif de Microsoft MS12-063 (cf. section\nDocumentation).\n",
"cves": [],
"links": [
{
"title": "Correctif provisoire Microsoft 2757760 du 19 septembre 2012 :",
"url": "http://support.microsoft.com/kb/2757760"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 2757760 :",
"url": "http://blogs.technet.com/b/msrc/archive/2012/09/17/microsoft-releases-security-advisory-2757760.aspx"
},
{
"title": "Avis de s\u00e9curit\u00e9 CERTA-2012-AVI-516 du 21 septembre 2012 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2012-AVI-516/index.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS12-063 du 21 septembre 2012 :",
"url": "http://technet.microsoft.com/fr-fr/security/bulletin/MS12-063"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 2757760 :",
"url": "http://blogs.technet.com/b/msrc/archive/2012/09/18/additional-information-about-internet-explorer-and-security-advisory-2757760.aspx"
},
{
"title": "Outil de r\u00e9duction des risques li\u00e9s aux exploitations EMET :",
"url": "http://www.microsoft.com/en-us/download/details.aspx?id=29851"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS12-063 du 21 septembre 2012 :",
"url": "http://technet.microsoft.com/en-us/security/bulletin/MS12-063"
}
],
"reference": "CERTA-2012-ALE-006",
"revisions": [
{
"description": "version initiale ;",
"revision_date": "2012-09-18T00:00:00.000000"
},
{
"description": "ajout d\u0027un contournement provisoire, ajout et modification des documentations ;",
"revision_date": "2012-09-19T00:00:00.000000"
},
{
"description": "ajout d\u0027un contournement provisoire, ajout et modification des documentations.",
"revision_date": "2012-09-20T00:00:00.000000"
},
{
"description": "fermeture de l\u0027alerte, suite \u00e0 la diffusion du correctif par l\u0027\u00e9diteur.",
"revision_date": "2012-09-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eMicrosoft\nInternet Explorer\u003c/span\u003e. Elle permet une ex\u00e9cution de code arbitraire \u00e0\ndistance au moyen d\u0027une page Web sp\u00e9cialement con\u00e7ue. Cette\nvuln\u00e9rabilit\u00e9 est activement exploit\u00e9e et largement diffus\u00e9e.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Internet Explorer",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft 2757760 du 17 septembre 2012",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…