Check Point Reference: | CPAI-2014-0800 |
Date Published: | 3 Feb 2014 |
Severity: | Critical |
Last Updated: | Wednesday 01 January, 2014 |
Source: | CVE-2010-0248 |
Protection Provided by: | |
Who is Vulnerable? | |
Vulnerability Description | A use-after-free vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to the way Internet Explorer accesses an object that has not been correctly initialized or has been deleted. A remote attacker could trigger this vulnerability by accessing an object that was not properly initialized or is deleted leading to memory corruption. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system. |