Palo Alto Networks Discovers 4 Critical Internet Explorer Vulnerabilities

https://i0.wp.com/www.sv411.com/wp-content/uploads/Palo-Alto-Networks.pngPalo Alto Networks researcher Bo Qu has discovered 4 new critical Internet Explorer (IE) vulnerabilities covering versions 8, 9, 10, and the latest, Internet Explorer 11.

Each of these discoveries allows full remote code execution using a memory corruption vulnerability in IE. They have been documented in Microsoft Security Bulletin MS14-010 and part of the February 2013 Security Bulletin.

Details:

  • Critical memory corruption vulnerability affecting Internet Explorer versions 8, 9 & 10 (CVE-2014-0272)
  • Critical memory corruption vulnerability affecting Internet Explorer versions 9, 10, 11 (CVE-2014-0273)
  • Critical memory corruption vulnerability affecting Internet Explorer version 8 (CVE-2014-0278)
  • Critical memory corruption vulnerability affecting Internet Explorer version 11 (CVE-2014-0290)

Palo Alto Networks customers are protected from these vulnerabilities through our regular Vulnerability Protection updates, and we recommend Internet Explorer users upgrade to the latest patch from Microsoft.

In our continuing commitment to the security research community, these vulnerabilities were disclosed to Microsoft through our participation in the Microsoft Active Protections Program (MAPP) program, which ensures the timely, responsible disclosure of new vulnerabilities and creation of protections from security vendors.

Contact Us For More Information on Palo Alto Networks Next Generation Firewall’s

via Palo Alto Networks Discovers 4 Critical Internet Explorer Vulnerabilities – Palo Alto Networks Blog.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of the author. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided "as-is". The author shall not be liable for any damages whatsoever arising out of the content or use of this blog.
%d bloggers like this: