|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Internet Explorer: code execution via VML
Synthesis of the vulnerability
An attacker can invite the victim to display a malicious VML image, in order to execute code on his computer.
Impacted products: IE, Windows RT.
Severity of this bulletin: 4/4.
Consequences of an intrusion: user access/rights.
Hacker's origin: document.
Creation date: 12/02/2013.
Références of this threat: 2797052, BID-57852, CERTA-2013-AVI-114, CVE-2013-0030, MS13-010, VIGILANCE-VUL-12411.
Description of the vulnerability
The VML format (Vector Markup Language) stores vector images in XML.
However, malicious VML data corrupt IE memory.
An attacker can therefore invite the victim to display a malicious VML image, in order to execute code on his computer.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a computer vulnerability workaround. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.