Jump to content
Nytro

Microsoft Internet Explorer Cbutton Object Use-After-Free Vulnerability - Metasploit

Recommended Posts

Posted

Microsoft Internet Explorer Cbutton Object Use-After-Free Vulnerability - Metasploit Demo

Description: Author:

=======

Mzer0 : 4 X Security Team | Just another WordPress site https://twitter.com/4xsecurityteam

Tested on Windows XP SP3 With IE 8

--------------------------------------------------------

Description:

----------------

This module exploits a vulnerability found in Microsoft Internet Explorer.

A use-after-free condition occurs when a CButton object is freed,

but a reference is kept and used again during a page reload, an

invalid memory that's controllable is used, and allows arbitrary

code execution under the context of the user.

Please note: This vulnerability has been exploited in the wild targeting

ainly China/Taiwan/and US-based computers

Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.

Original Source:

Sursa: Microsoft Internet Explorer Cbutton Object Use-After-Free Vulnerability - Metasploit Demo

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...