Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "OnMove Use After Free Vulnerability."
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15852 | vdb entry signature |
http://www.securitytracker.com/id?1027555 | vdb entry |
http://www.securityfocus.com/bid/55641 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78756 | vdb entry |
http://www.us-cert.gov/cas/techalerts/TA12-255A.html | third party advisory us government resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-063 | vendor advisory |