The information below was sent to the U-M IT Security Community April 29, 2014.
A vulnerability in Microsoft Internet Explorer could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Microsoft Internet Explorer contains a use-after-free vulnerability. This can allow for arbitrary code execution.
Internet Explorer versions 6 through 11 are affected.
Patch affected systems as patches are made available. IIA is continuing to monitor reporting on this vulnerability. In the meantime, the use of alternate browsers is recommended. Some U-M systems require Internet Explorer for full functionality. It is recommended that members of the U-M community use only use Internet Explorer when necessary to access these trusted U-M systems.
Exploit code is publicly available with limited, targeted attacks.
The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.
Please advise users that the use of alternate browsers is recommended. Some U-M systems (such as M-Pathways) require Internet Explorer for full functionality. Users can use IE for access to these trusted U-M systems if necessary. You can refer users to this page on Safe Computing for details:
Thank you for helping to field any questions you get.
Please contact email@example.com.