Jump to content
begood

[0-day]Microsoft Internet Explorer iepeers.dll use-after-free exploit (meta)

Recommended Posts

Posted

A new Microsoft Internet Explorer 0day exploit has been found circulating in-the-wild. According to Microsoft, there are targeted attacks attempting to use this vulnerability. Microsoft published a security advisory for this vulnerability here:

Microsoft Security Advisory (981374): Vulnerability in Internet Explorer Could Allow Remote Code Execution

The vulnerability is a use-after-free (invalid pointer reference) vulnerability within iepeers.dll and only Internet Explorer versions 6 and 7 are vulnerable. Internet Explorer 8 and 5 are not affected.

I’ve found this exploit in-the-wild on www.topix21century.com. The payload download and executes a binary file which connects back to notes.topix21century.com.

Here’s the exploit as it was found in-the-wild, a bit un-obfuscated and payload removed –

http://www.rec-sec.com/exploits/ie_iepeers_wild.txt

And here’s a Metasploit exploit module for this vulnerability. Tested successfully on the following platforms:

– Microsoft Internet Explorer 7, Windows Vista SP2

– Microsoft Internet Explorer 7, Windows XP SP3

– Microsoft Internet Explorer 6, Windows XP SP3

Download ie_iepeers_pointer.rb.

As usual, this post will update with further references and updates when available.

Happy exploitation :-)

source

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...