MS.Windows.MSXML.Use.After.Free

description-logoDescription

This indicates an attack attempt to exploit a Code Execution vulnerability in Microsoft Windows.
The vulnerability is due to an error in MSXML3 library when handling malicious XML document. An attacker can exploit this to execute arbitrary code on vulnerable systems via a crafted XML file.

affected-products-logoAffected Products

Windows Vista
Windows Server 2008
Windows 7
Windows 8.1
Windows Server 2012 and Windows Server 2012 R2
Windows RT 8.1
Windows 10

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor
http://technet.microsoft.com/security/bulletin/MS16-040

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2019-06-10 14.629 Severity:critical:high