vendor:
Internet Explorer
by:
Skylined
7,6
CVSS
HIGH
Use-After-Free
416
CWE
Product Name: Internet Explorer
Affected Version From: Microsoft Internet Explorer 8
Affected Version To: Microsoft Internet Explorer 8
Patch Exists: YES
Related CWE: CVE-2015-1701
CPE: a:microsoft:internet_explorer:8.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2015
Microsoft Internet Explorer 8 Use-After-Free Vulnerability
An attacker would need to get a target user to open a specially crafted web-page. Disabling Javascript should prevent an attacker from triggering the vulnerable code path. Recompiling the regular expression pattern during a replace can cause the code to reuse a freed string, but only if the string is freed from the cache by allocating and freeing a number of strings of certain size, as explained by Alexander Sotirov in his Heap Feng-Shui presentation. Exploitation was not investigated.
Mitigation:
Disabling Javascript should prevent an attacker from triggering the vulnerable code path.