MS.IE.Deleted.Data.Source.Memory.Corruption
Description
This indicates an attack attempt against a Deleted Object Access vulnerability in Microsoft Internet Explorer.
The vulnerability is caused by an error when the vulnerable software tries to access a deleted object. It allows a remote attacker to execute arbitrary code via sending a crafted web page.
Affected Products
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 6.0 SP3
Microsoft Internet Explorer 6.0 SP2
Microsoft Internet Explorer 6.0 SP1
Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0
Avaya Messaging Application Server 5.2
Avaya Messaging Application Server 5
Avaya Meeting Exchange - Webportal
Avaya Meeting Exchange - Web Conferencing Server
Avaya Meeting Exchange - Streaming Server
Avaya Meeting Exchange - Recording Server
Avaya Meeting Exchange - Client Registration Server
Avaya Meeting Exchange 5.0.0.52
Avaya Meeting Exchange 5.2 SP2
Avaya Meeting Exchange 5.2 SP1
Avaya Meeting Exchange 5.2
Avaya Meeting Exchange 5.1 SP1
Avaya Meeting Exchange 5.1
Avaya Meeting Exchange 5.0 SP2
Avaya Meeting Exchange 5.0 SP1
Avaya Meeting Exchange 5.0
Avaya Communication Server 1000 Telephony Manager 4.0
Avaya Communication Server 1000 Telephony Manager 3.0
Avaya CallPilot 5.0
Avaya CallPilot 4.0
Avaya Aura Conferencing 6.0 Standard
Avaya Aura Conferencing 6.0 SP1 Standard
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |