MS KB2757760: Vulnerability in Internet Explorer Could Allow Remote Code Execution (deprecated)

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.


Synopsis :

This plugin has been deprecated.

Description :

The remote host is missing the workaround referenced in KB 2757760
(Microsoft 'Fix it' 50939). This workaround mitigates a use-after-free
vulnerability in Internet Explorer. Without this workaround enabled,
an attacker could exploit this vulnerability by tricking a user into
view a maliciously crafted web page, resulting in arbitrary code
execution. This vulnerability is being actively exploited in the
wild.

This plugin has been deprecated due to the publication of MS12-063.
Microsoft has released patches that make the workarounds
unnecessary. To check for the patches, use Nessus plugin ID 62223.

See also :

http://www.nessus.org/u?bd827909
http://technet.microsoft.com/en-us/security/advisory/2757760
http://support.microsoft.com/kb/2757760

Solution :

n/a

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.4
(CVSS2#E:F/RL:W/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 62201 ()

Bugtraq ID: 55562

CVE ID: CVE-2012-4969

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now