what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Microsoft Internet Explorer 11 MSHTML CView::CalculateImageImmunity Use-After-Free

Microsoft Internet Explorer 11 MSHTML CView::CalculateImageImmunity Use-After-Free
Posted Nov 2, 2016
Authored by SkyLined

Setting the listStyleImage property of an Element object causes MSIE 11 to allocate 0x4C bytes for an "image context" structure, which contains a reference to the document object as well as a reference to the same CMarkup object as the document. When the element is removed from the document/document fragment, this image context is freed on the next "draw". However, the code continues to use the freed context almost immediately after it is freed.

tags | exploit
SHA-256 | 7c3474c2032d42f936d3ff0e59c7c8ce6f77233bc469225fdf7ba7bf031ca859

Microsoft Internet Explorer 11 MSHTML CView::CalculateImageImmunity Use-After-Free

Change Mirror Download
Throughout November, I plan to release details on vulnerabilities I
found in web-browsers which I've not released before. This is the second
entry in that series.

The below information is also available on my blog at
http://blog.skylined.nl/20161102001.html. There you can find a repro
that triggered this issue in addition to the information below.

Follow me on http://twitter.com/berendjanwever for daily browser bugs.

MSIE 11 MSHTML CView::CalculateImageImmunity UAF
================================================

(The fix and CVE number for this bug are not known)

Synopsis
--------
Setting the `listStyleImage` property of an Element object causes MSIE
11 to allocate 0x4C bytes for an "image context" structure, which
contains a reference to the document object as well as a reference to
the same `CMarkup` object as the document. When the element is removed
from the document/document fragment, this image context is freed on the
next "draw". However, the code continues to use the freed context almost
immediately after it is freed.

Known affected versions, attack vectors and mitigations
-----------------------
+ Microsoft Internet Explorer 11

An attacker would need to get a target user to open a specially
crafted webpage. As far as can be determined, disabling JavaScript
should prevent an attacker from triggering the vulnerable code path.

Exploit
-------
I tried a few tricks to see if there was an easy way to reallocate the
freed memory before the reuse, but was unable to find anything. I do not
know if there is a way to cause further reuse of the freed memory later
on in the code. Running the repro as-is without page heap does not
appear to trigger crashes. It does not appear that there is enough time
between the free and reuse to exploit this issue.

Repro.html:

<script>
var oDocumentFragment = document.createDocumentFragment(),
oElement = document.createElement('x');
oDocumentFragment.appendChild(oElement);
oElement.style.listStyleImage = "url(x)";
oDocumentFragment.removeChild(oElement);
</script>



Timeline
--------
* May 2014: This vulnerability was found through fuzzing.
* June 2014: This vulnerability was submitted to ZDI.
* July 2014: ZDI rejects the submission.
* November 2016: The issue does not reproduce in the latest build of
MSIE 11.
* November 2016: Details of this issue are released.

Unfortunately, my records of what happened after ZDI rejected the issue
are patchy. It appears that I did not pursue reporting the issue
anywhere else, but Microsoft does appear to have patched the issue, as I
can no longer reproduce it.

Cheers,

SkyLined



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close