spacer.png, 0 kB
Bilgi için: bilgi at bilgiguvenligi gov tr   

 

spacer.png, 0 kB
spacer.png, 0 kB
Microsoft Internet Explorer Bellek Bozulması Güvenlik Açıklığı Yazdır E-posta
Microsoft Internet Explorer uygulamasında bellek bozulması güvenlik açıklığı olduğu tespit edilmiştir.
Kaynak: SecurityFocus
 
Seviye:  Yüksek
Bildiri Sürümü: 1.0
Açıklanma Zamanı: 11.03.2014
Yenilenme Zamanı: 11.03.2014
Etkilenen Sistemler: Microsoft Internet Explorer 9
+ Microsoft Windows 7
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems 0
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems 0
+ Microsoft Windows 7 Home Premium - Sp1 X64
+ Microsoft Windows 7 Home Premium - Sp1 X32
+ Microsoft Windows Server 2008 R2
+ Microsoft Windows Server 2008 for 32-bit Systems SP2
+ Microsoft Windows Server 2008 for 32-bit Systems 0
+ Microsoft Windows Server 2008 for x64-based Systems SP2
+ Microsoft Windows Server 2008 for x64-based Systems 0
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Vista SP2
+ Microsoft Windows Vista SP1
+ Microsoft Windows Vista x64 Edition SP2
+ Microsoft Windows Vista x64 Edition SP1
+ Microsoft Windows Vista x64 Edition 0
Microsoft Internet Explorer 8
+ Microsoft Windows 7
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems 0
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems 0
+ Microsoft Windows 7 Home Premium 0
+ Microsoft Windows 7 Home Premium - Sp1 X64
+ Microsoft Windows 7 Home Premium - Sp1 X32
+ Microsoft Windows Server 2008 R2
+ Microsoft Windows Server 2003 Sp2 X64
+ Microsoft Windows Server 2003 SP2
+ Microsoft Windows Server 2003 Sp1 X64
+ Microsoft Windows Server 2003 SP1
+ Microsoft Windows Server 2008 R2 SP1
+ Microsoft Windows Server 2008 for x64-based Systems SP2
+ Microsoft Windows Server 2008 R2 x64 SP1
+ Microsoft Windows Server 2008 R2 x64 0
+ Microsoft Windows Server 2008 Standard Edition X64
+ Microsoft Windows Server 2008 Standard Edition SP2
+ Microsoft Windows Server 2008 Standard Edition 0
+ Microsoft Windows Server 2008 Standard Edition - Sp2 Web
+ Microsoft Windows Vista SP2
+ Microsoft Windows Vista SP1
+ Microsoft Windows Vista Home Premium SP2
+ Microsoft Windows Vista Home Premium SP1
+ Microsoft Windows Vista Home Premium
+ Microsoft Windows Vista Home Basic SP2
+ Microsoft Windows Vista Home Basic SP1
+ Microsoft Windows Vista Home Basic
+ Microsoft Windows Vista Enterprise SP2
+ Microsoft Windows Vista Enterprise SP1
+ Microsoft Windows Vista Enterprise
+ Microsoft Windows Vista Business SP2
+ Microsoft Windows Vista Business SP1
+ Microsoft Windows Vista 0
+ Microsoft Windows Vista Business 64-bit edition SP2
+ Microsoft Windows Vista Business 64-bit edition SP1
+ Microsoft Windows Vista Business 64-bit edition 0
+ Microsoft Windows Vista Enterprise 64-bit edition SP2
+ Microsoft Windows Vista Enterprise 64-bit edition SP1
+ Microsoft Windows Vista Enterprise 64-bit edition 0
+ Microsoft Windows Vista Home Basic 64-bit edition Sp2 X64
+ Microsoft Windows Vista Home Basic 64-bit edition SP2
+ Microsoft Windows Vista Home Basic 64-bit edition SP1
+ Microsoft Windows Vista Home Basic 64-bit edition 0
+ Microsoft Windows Vista Home Premium 64-bit edition SP2
+ Microsoft Windows Vista Home Premium 64-bit edition SP1
+ Microsoft Windows Vista Home Premium 64-bit edition 0
+ Microsoft Windows XP 0
+ Microsoft Windows XP Embedded SP3
+ Microsoft Windows XP Embedded SP2
+ Microsoft Windows XP Embedded SP1
+ Microsoft Windows XP Embedded
+ Microsoft Windows XP Home SP3
+ Microsoft Windows XP Home SP2
+ Microsoft Windows XP Home SP1
+ Microsoft Windows XP Home
+ Microsoft Windows XP Media Center Edition SP3
+ Microsoft Windows XP Media Center Edition SP2
+ Microsoft Windows XP Media Center Edition SP1
+ Microsoft Windows XP Professional SP3
+ Microsoft Windows XP Professional SP2
+ Microsoft Windows XP Professional SP1
+ Microsoft Windows XP Professional
+ Microsoft Windows XP Professional x64 Edition SP2
+ Microsoft Windows XP Professional x64 Edition
 
CVE: CVE-2014-0297
BID: 66023
Referanslar: Security Focus
http://www.securityfocus.com/bid/66023
Üretici Web Sitesi
http://www.microsoft.com/ie/
Yazar(lar): Amol Naik
 
Açıklama: Microsoft Internet Explorer uygulamasının bellek bozulması güvenlik açıklığına yatkın olduğu belirlenmiştir. Saldırgan bu açıklığın istismar ederek o anda oturum açmış kullanıcı yetkileri ile bilgisayarda isteğe bağlı kod çalıştırabilir.
Etki: Servis dışı bırakma ve isteğe bağlı kod çalıştırma
Çözüm: Açıklık için yama yayınlamıştır. Referanslardaki web sayfası ziyaret edilebilir.
 
spacer.png, 0 kB
spacer.png, 0 kB
Copyright 2017 TÜBİTAK-BİLGEM. Sitenin teknik altyapısında Joomla kullanılmıştır. Yazar ve site referans gösterilmeden alıntı yapılamaz. Görüşleriniz
spacer.png, 0 kB