#VU275 Memory Corruption Vulnerability in Microsoft Internet Explorer and Microsoft Edge - CVE-2016-3289
Published: August 10, 2016 / Updated: January 25, 2017
Microsoft Internet Explorer
Microsoft Edge
Microsoft
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when parsing objects in memory. A remote attacker can create a specially crafted web page, trick a victim to visit that page, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability my allow an attacker to run arbitrary code on vulnerable system.