Internet Explorer Mobile
|TREND MICRO CUSTOMER PROTECTION
|Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['19335']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
The specific flaw exists within the handling of CAttrArray objects. By manipulating a document's elements an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process.
01/08/15 - ZDI disclosed to the vendor
- Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone
|AbdulAziz Hariri - HP Zero Day Initiative