The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability alert CVE-2013-0030

Internet Explorer: code execution via VML

Synthesis of the vulnerability

An attacker can invite the victim to display a malicious VML image, in order to execute code on his computer.
Impacted products: IE, Windows RT.
Severity of this bulletin: 4/4.
Consequences of an intrusion: user access/rights.
Hacker's origin: document.
Creation date: 12/02/2013.
Références of this threat: 2797052, BID-57852, CERTA-2013-AVI-114, CVE-2013-0030, MS13-010, VIGILANCE-VUL-12411.

Description of the vulnerability

The VML format (Vector Markup Language) stores vector images in XML.

However, malicious VML data corrupt IE memory.

An attacker can therefore invite the victim to display a malicious VML image, in order to execute code on his computer.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a computer vulnerability workaround. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.