Microsoft has issued a security advisory for the Internet Explorer browser.
The advisory, posted on Sept. 17, notes Microsoft is investigating reports of a vulnerability affecting all versions of Internet Explorer.
Follow the latest Tech news on Twitter: @LatinosPostTech
"The vulnerability is a remote code execution vulnerability," explains Microsoft. "The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer."
The Redmond-based organization added that an attacker could create a unique website to take advantage of the Internet Explorer vulnerability and trick the victim into visiting the corrupted website.
Microsoft added that it will provide an update to Internet Explorer users once the investigation is completed. The fix could come in the monthly security update or an out-of-cycle security update, depending on the customer's needs.
The security advisory comes a week after Microsoft issued the September Security Bulletin. The September bulletin noted the monthly update fixes 10 privately reported vulnerabilities labeled "Critical" for Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9 and Internet Explorer 10 on Windows clients. The label was "Moderate" for the same Internet Explorer versions on Windows servers.
A "Critical" label represents a "vulnerability whose exploitation could allow code execution without user interaction. These scenarios include self-propagating malware (e.g. network worms), or unavoidable common use scenarios where code execution occurs without warnings or prompts," according to the bulletin.
A video regarding the Security Bulletin has been posted by Microsoft featuring the company's Trustworthy Computing's Dustin Childs.
To view the September Update video, click here, if video below is unavailable.
__
For the latest updates, follow Latinos Post's Michael Oleaga on Twitter: @EditorMikeO