Vulnerability in Internet Explorer could allow remote code execution

March 16, 2010 – 9:06 AM

Microsoft has released a Microsoft security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To view the security advisory, visit the following Microsoft Web site:

http://www.microsoft.com/technet/security/advisory/981374.mspx

Two Fix it solutions are available:

  • Fix it solution for peer factory in iepeers.dll – We have created an application compatibility database that will disable peer factory in the iepeers.dll binary for supported versions of Internet Explorer on Windows XP and Windows Server 2003.
  • Fix it solution for Data Execution Prevention – We have created an application compatibility database that will enable Data Execution Prevention (DEP) for all versions of Internet Explorer that support DEP. You do not need this database if you are using Internet Explorer 8 on Windows XP Service Pack 3 (SP3) or on Windows Vista SP1 or later versions. This is because Internet Explorer 8 opts-in to DEP by default on these platforms.

Fix It page:
http://support.microsoft.com/kb/981374

You must be logged in to post a comment.