Memory corruption in Microsoft Internet Explorer - CVE-2017-11790
Published: October 10, 2017 / Updated: October 10, 2017
Microsoft Internet Explorer
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when Internet Explorer improperly handles objects in memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.