Important Warning: Internet Explorer Vulnerability

Published On: April 28, 2014|Categories: Blog|

ie-vulnerability

 

Internet Explorer Vulnerability
Date: April 28th, 2014
Severity: High

Affected Web Browsers: 
Internet Explorer 6, 7, 8, 9, 10, 11

Affected Operating Systems:
 
All Microsoft Windows operating systems

 

 

Type of Attack: 

  • Remote code execution and memory access.
  • An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

 

How Can I Avoid This Attack?

Avoid using Internet Explorer. Use a browser such as Google Chrome or Firefox instead.
If you have to use Internet Explorer, download and install EMET. This toolkit mitigates this type of attack. Perform the following steps: 

 

 Will This Attack Be Fixed?

Microsoft is actively working on a fix for this attack. Please note that because Windows XP support has reached end-of-life, it is unlikely that Windows XP will receive a patch.

 

Want to Know More?
Click here for more information.