Unsolved

This post is more than 5 years old

5 Journeyman

 • 

15.6K Posts

 • 

45K Points

5287

June 12th, 2012 18:00

FixIt: Microsoft XML Core Services Uninitialised Object Vulnerability

The following was copied/pasted from http://secunia.com/advisories/49456 :

Description

A[n extremely critical] vulnerability has been reported in Microsoft XML Core Services, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an error when attempting to access an object in memory that has not been initialised.

Successful exploitation allows execution of arbitrary code by e.g. tricking a user into viewing a malicious web page in Internet Explorer.

NOTE: The vulnerability is reportedly being actively exploited.

Provided and/or discovered by
Reported as a 0-day.

=========

This vulnerability is UNpatched!   But Microsoft has acknowledged it:

Upon completion of our investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.

for technical details, see   http://technet.microsoft.com/en-us/security/advisory/2719615

for a "temporary work-around" ("fix it"), see http://support.microsoft.com/kb/2719615

Microsoft Fix it 50897 enables the [temporary] fix

Also be sure to download and save Microsoft Fix it 50898 , which UNDOES the temporary fix   [This should be run when Microsoft eventually releases the "permanent"/official fix for this issue].

EDIT/Note:   Secunia's PSI continues to report MS XML Core Services as "Insecure, No Solution" even after the "fix it" is applied.

5 Journeyman

 • 

15.6K Posts

 • 

45K Points

June 15th, 2012 07:00

0 events found

No Events found!

Top