Lucene search

K
zdiAshutosh Mehra (https://twitter.com/ashutoshmehra)ZDI-15-522
HistoryOct 13, 2015 - 12:00 a.m.

Microsoft Internet Explorer EditWith Sandbox Escape Vulnerability

2015-10-1300:00:00
Ashutosh Mehra (https://twitter.com/ashutoshmehra)
www.zerodayinitiative.com
9

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.087 Low

EPSS

Percentile

94.5%

This vulnerability allows remote attackers to escape the Application Container and execute code in the context of the logged-in user on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the EditWith functionality of the broker process for Internet Explorer. Code that is running in the AppContainer can use the DelegateExecute functionality of shell execution to execute arbitrary applications in the context of the user, not just applications that are in the Internet Explorer allowed list.

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.087 Low

EPSS

Percentile

94.5%