[Owasp-manila] Exploit Code Surfaces for CVE-2012-1875 Internet Explorer Bug | threatpost

Owasp michael.dungog at owasp.org
Tue Jun 19 23:39:27 UTC 2012


Less than a week after Microsoft released a patch for a critical vulnerability in Internet Explorer, attack code has become publicly available in the form of a module for theMetasploit Framework. The bug is serious one that enables an attacker to bypass both ASLR and DEP, the two main anti-exploit technologies in IE, and run arbitrary code on the victim's machine.



http://m.threatpost.com/en_us/blogs/exploit-code-surfaces-cve-2012-1875-internet-explorer-bug-061812?utm_source=Newsletter_061812&utm_medium=Email%20Marketing&utm_campaign=Newsletter&CID=


Regards,

Michael Dungog
OWASP-Manila Chapter Leader
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-manila/attachments/20120620/43542d1a/attachment.html>


More information about the Owasp-manila mailing list