exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Microsoft Internet Explorer 8 Use-After-Free

Microsoft Internet Explorer 8 Use-After-Free
Posted Feb 13, 2013
Authored by sgb | Site security-assessment.com

A use-after-free memory corruption vulnerability was identified in Microsoft Internet Explorer 8. This allows a malicious user to remotely execute arbitrary code on a vulnerable user's machine, in the context of the current user. The memory corruption happens when the application of a style sheet performs style computations on the DOM. A CParaElement node is released but a reference is still kept in CDoc. This memory is reused when a CDoc relayout is performed. Microsoft patch MS13-009 addresses this issue.

tags | advisory, arbitrary
SHA-256 | c1ad970003b5ea6035cc3a1a86aced80abab4e373de1b2a7289fd2a3864add83

Microsoft Internet Explorer 8 Use-After-Free

Change Mirror Download
========================================================================
= Microsoft Internet Explorer SLayoutRun Use After Free
=
= Author: Scott Bell <scott.bell[at]security-assessmemt.com>
=
= Vendor Website: www.microsoft.com
=
= Affected Version: Microsoft Internet Explorer 8
=
= Advisory URL:
http://www.security-assessment.com/files/documents/advisory/ms13_009_ie_slayoutrun_uaf.pdf
=
= Metasploit Module:
http://www.security-assessment.com/files/documents/advisory/ms13_009_ie_slayoutrun_uaf.rb
=
========================================================================


== Description ==

A Use-after-free memory corruption vulnerability was identified in
Microsoft Internet Explorer 8. This allows a malicious user to remotely
execute arbitrary code on a vulnerable user’s machine, in the context of
the current user. The memory corruption happens when the application of
a style sheet performs style computations on the DOM. A CParaElement
node is released but a reference is still kept in CDoc. This memory is
reused when a CDoc relayout is performed.


== Solution ==

Microsoft validated this security issue in Internet Explorer 8 and
issued a patch (MS13-009) to remedy it. Security-Assessment.com
recommends applying the patch which has been made available via Windows
Update.


== About Security-Assessment.com ==

Security-Assessment.com is a leading team of Information Security
consultants specialising in providing high quality Information Security
services to clients throughout the Asia Pacific region. Our clients
include some of the largest globally recognised companies in areas such
as finance, telecommunications, broadcasting, legal and government. Our
aim is to provide the very best independent advice and a high level of
technical expertise while creating long and lasting professional
relationships with our clients. Security-Assessment.com is committed to
security research and development, and its team continues to identify
and responsibly publish vulnerabilities in public and private software
vendor's products. Members of the Security-Assessment.com R&D team are
globally recognised through their release of whitepapers and
presentations related to new security research.

Web: www.security-assessment.com
Email: info@security-assessment.com


Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close