Описание
DLL Loading Remote Code Execution Vulnerability
A remote code execution vulnerability exists when Internet Explorer improperly validates input before loading dynamic link library (DLL) files. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
To exploit the vulnerability, an attacker would first have to log on to the target system and then run a specially crafted application.
The updates address the vulnerability by correcting how Internet Explorer validates input before loading DLL files.
FAQ
I am running Internet Explorer on Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2. Does this mitigate these vulnerabilities? Yes. By default, Internet Explorer on Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2 runs in a restricted mode that is known as Enhanced Security Configuration. Enhanced Security Configuration is a group of preconfigured settings in Internet Explorer that can reduce the likelihood of a user or administrator downloading and running specially crafted web content on a server. This is a mitigating factor for websites that you have not added to the Internet Explorer Trusted sites zone.
Can EMET help mitigate attacks that attempt to exploit these vulnerabilities? Yes. The Enhanced Mitigation Experience Toolkit (EMET) enables users to manage security mitigation technologies that help make it more difficult for attackers to exploit memory corruption vulnerabilities in a given piece of software. EMET can help mitigate attacks that attempt to exploit these vulnerabilities in Internet Explorer on systems where EMET is installed and configured to work with Internet Explorer.
For more information about EMET, see the Enhanced Mitigation Experience Toolkit.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Internet Explorer 11 on Windows 10 for 32-bit Systems | ||
Internet Explorer 11 on Windows 10 for x64-based Systems | ||
Internet Explorer 11 on Windows 10 Version 1511 for 32-bit Systems | ||
Internet Explorer 11 on Windows 10 Version 1511 for x64-based Systems | ||
Internet Explorer 11 on Windows 8.1 for 32-bit systems | ||
Internet Explorer 11 on Windows 8.1 for x64-based systems | ||
Internet Explorer 11 on Windows Server 2012 R2 | ||
Internet Explorer 11 on Windows RT 8.1 | - |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
EPSS
Связанные уязвимости
Microsoft Internet Explorer 11 mishandles DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability."
Microsoft Internet Explorer 11 mishandles DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability."
Уязвимость браузера Internet Explorer, позволяющая нарушителю повысить свои привилегии
EPSS