|CVSS SCORE||6.8, (AV:N/AC:M/Au:N/C:P/I:P/A:P)|
Internet Explorer Mobile
|TREND MICRO CUSTOMER PROTECTION||Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 19411. For further product information on the TippingPoint IPS: http://www.tippingpoint.com|
The specific flaw exists within the handling of CCurrentStyle objects. By manipulating a document's elements an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process.
01/20/15 - ZDI disclosed to the vendor
- Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone
|CREDIT||AbdulAziz Hariri - HP Zero Day Initiative