Lucene search

K
zdiAshutosh Mehra (https://twitter.com/ashutoshmehra)ZDI-15-325
HistoryJul 14, 2015 - 12:00 a.m.

Microsoft Internet Explorer DLL Planting Sandbox Escape Vulnerability

2015-07-1400:00:00
Ashutosh Mehra (https://twitter.com/ashutoshmehra)
www.zerodayinitiative.com
11

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.021 Low

EPSS

Percentile

89.1%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of DLL loading by the Internet Explorer broker process, which can be induced to load a library in its context from a directory controlled by the low-integrity process. An attacker can leverage this vulnerability to execute code under the context of the user at medium integrity.

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.021 Low

EPSS

Percentile

89.1%