MS.Windows.MSXML.Use.After.Free
Description
This indicates an attack attempt to exploit a Code Execution vulnerability in Microsoft Windows.
The vulnerability is due to an error in MSXML3 library when handling malicious XML document. An attacker can exploit this to execute arbitrary code on vulnerable systems via a crafted XML file.
Affected Products
Windows Vista
Windows Server 2008
Windows 7
Windows 8.1
Windows Server 2012 and Windows Server 2012 R2
Windows RT 8.1
Windows 10
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor
http://technet.microsoft.com/security/bulletin/MS16-040
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-06-10 | 14.629 | Severity:critical:high |