
Microsoft XML Core Services (MSXML) is a set of services that allow building Windows-native XML-based applications. All MSXML products are exposed as Component Object Model (COM) objects. Each version of MSXML exposes its own set of CLSIDs and ProgIDs.
A memory corruption vulnerability exists in Microsoft XML Core Services. Specifically, the vulnerable MSXML objects fail to handle parameter exceptions when certain method is invocated. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted web page. Successful exploitation could result in arbitrary code execution in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
The vulnerability has been assigned as CVE-2012-1889.
SonicWALL has released multiple IPS signatures to detect and block specific exploitation attempts targeting this vulnerability. The signatures are listed below:
Share This Article

An Article By
An Article By
Security News
Security News