Short Name |
HTTP:IESHIMS-DLL-HIJACK |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
HTTP |
Keywords |
Microsoft Internet Explorer IESHIMS.DLL Insecure Library Loading |
Release Date |
2011/05/17 |
Update Number |
1921 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known remote code execution vulnerability in Microsoft Internet Explorer. It is due to a design weakness in loading Dynamically Linked Libraries. Remote attackers can exploit this by enticing target users to download a malicious "IESHIMS.DLL" file. A successful attack can result in loading the attacker-controlled library and execution of arbitrary code with the privileges of the logged-in user. If a user is logged-on with administrative user rights, an attacker can take complete control of the affected system.
Microsoft Internet Explorer is prone to vulnerability that lets attackers execute arbitrary code. An attacker can exploit this issue by enticing a legitimate user to use the vulnerable application to open a file from a network share location that contains a specially crafted Dynamic Link Library (DLL) file.