exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Microsoft Internet Explorer 8 Use-After-Free

Microsoft Internet Explorer 8 Use-After-Free
Posted Feb 13, 2013
Authored by sgb | Site security-assessment.com

A use-after-free memory corruption vulnerability was identified in Microsoft Internet Explorer 8. This allows a malicious user to remotely execute arbitrary code on a vulnerable user's machine, in the context of the current user. The memory corruption happens when the application of a style sheet performs style computations on the DOM. A CParaElement node is released but a reference is still kept in CDoc. This memory is reused when a CDoc relayout is performed. Microsoft patch MS13-009 addresses this issue.

tags | advisory, arbitrary
SHA-256 | c1ad970003b5ea6035cc3a1a86aced80abab4e373de1b2a7289fd2a3864add83

Microsoft Internet Explorer 8 Use-After-Free

Change Mirror Download
========================================================================
= Microsoft Internet Explorer SLayoutRun Use After Free
=
= Author: Scott Bell <scott.bell[at]security-assessmemt.com>
=
= Vendor Website: www.microsoft.com
=
= Affected Version: Microsoft Internet Explorer 8
=
= Advisory URL:
http://www.security-assessment.com/files/documents/advisory/ms13_009_ie_slayoutrun_uaf.pdf
=
= Metasploit Module:
http://www.security-assessment.com/files/documents/advisory/ms13_009_ie_slayoutrun_uaf.rb
=
========================================================================


== Description ==

A Use-after-free memory corruption vulnerability was identified in
Microsoft Internet Explorer 8. This allows a malicious user to remotely
execute arbitrary code on a vulnerable user’s machine, in the context of
the current user. The memory corruption happens when the application of
a style sheet performs style computations on the DOM. A CParaElement
node is released but a reference is still kept in CDoc. This memory is
reused when a CDoc relayout is performed.


== Solution ==

Microsoft validated this security issue in Internet Explorer 8 and
issued a patch (MS13-009) to remedy it. Security-Assessment.com
recommends applying the patch which has been made available via Windows
Update.


== About Security-Assessment.com ==

Security-Assessment.com is a leading team of Information Security
consultants specialising in providing high quality Information Security
services to clients throughout the Asia Pacific region. Our clients
include some of the largest globally recognised companies in areas such
as finance, telecommunications, broadcasting, legal and government. Our
aim is to provide the very best independent advice and a high level of
technical expertise while creating long and lasting professional
relationships with our clients. Security-Assessment.com is committed to
security research and development, and its team continues to identify
and responsibly publish vulnerabilities in public and private software
vendor's products. Members of the Security-Assessment.com R&D team are
globally recognised through their release of whitepapers and
presentations related to new security research.

Web: www.security-assessment.com
Email: info@security-assessment.com


Login or Register to add favorites

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    10 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    37 Files
  • 27
    Feb 27th
    34 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close