Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Layouts Handling Memory Corruption Vulnerability."
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://www.us-cert.gov/cas/techalerts/TA11-102A.html | third party advisory us government resource |
http://www.securitytracker.com/id?1025327 | vdb entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-018 | vendor advisory |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=900 | third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12463 | vdb entry signature |