JS/PropChange.A!exploit.CVE20133897
Analysis
JS/PropChange.A!exploit is the detection for malicious JavaScript files that exploit CVE-2013-3897, which is also known as the "Internet Explorer Memory Corruption Vulnerability". This is a vulnerability in the CDisplayPointer class in mshtml.dll of Microsoft Internet Explorer versions 6 through 11. The exploitation is performed by JavaScript code that uses the onpropertychange event handler. Successful exploitation may result in arbitrary code execution by a remote attacker or a denial of service.
Recommended Action
-
FortiGate Systems
- Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
FortiClient Systems
- Quarantine/delete files that are detected and replace infected files with clean backup copies.
Patch
- Download and install the following patch released by Microsoft: Microsoft Security Bulletin MS13-080 - Critical .
Telemetry
Detection Availability
FortiClient | |
---|---|
Extreme | |
FortiMail | |
Extreme | |
FortiSandbox | |
Extreme | |
FortiWeb | |
Extreme | |
Web Application Firewall | |
Extreme | |
FortiIsolator | |
Extreme | |
FortiDeceptor | |
Extreme | |
FortiEDR |