JS/PropChange.A!exploit.CVE20133897

description-logoAnalysis


JS/PropChange.A!exploit is the detection for malicious JavaScript files that exploit CVE-2013-3897, which is also known as the "Internet Explorer Memory Corruption Vulnerability". This is a vulnerability in the CDisplayPointer class in mshtml.dll of Microsoft Internet Explorer versions 6 through 11. The exploitation is performed by JavaScript code that uses the onpropertychange event handler. Successful exploitation may result in arbitrary code execution by a remote attacker or a denial of service.

recommended-action-logoRecommended Action

    FortiGate Systems
  • Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
    FortiClient Systems
  • Quarantine/delete files that are detected and replace infected files with clean backup copies.
    Patch
  • Download and install the following patch released by Microsoft: Microsoft Security Bulletin MS13-080 - Critical .

Telemetry logoTelemetry

Detection Availability

FortiClient
Extreme
FortiMail
Extreme
FortiSandbox
Extreme
FortiWeb
Extreme
Web Application Firewall
Extreme
FortiIsolator
Extreme
FortiDeceptor
Extreme
FortiEDR