Lucene search

K
zdiAnonymousZDI-11-195
HistoryJun 14, 2011 - 12:00 a.m.

Microsoft Internet Explorer selection.empty Remote Code Execution Vulnerability

2011-06-1400:00:00
Anonymous
www.zerodayinitiative.com
15

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.89 High

EPSS

Percentile

98.7%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Internet explorer handles the javascript statement β€˜selection.empty’ during certain onclick events. By causing a particular sequence of events, an attacker can cause a CDisplayObject to be freed while it is still in use. This results in an operation on previously freed memory that can be utilized to achieve remote code execution.

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.89 High

EPSS

Percentile

98.7%