@@ -18,10 +18,9 @@ def initialize(info={})
18
18
'Name' => "Microsoft Internet Explorer CDwnBindInfo Object Use-After-Free Vulnerability" ,
19
19
'Description' => %q{
20
20
This module exploits a vulnerability found in Microsoft Internet Explorer. A
21
- use-after-free condition occurs when a CDwnBindInfo object is freed by
22
- FollowHyperlink2, but a reference is kept in CDoc. As a result, when the reference
23
- is used again during a page reload, an invalid memory that's controllable is used,
24
- and allows arbitrary code execution under the context of the user.
21
+ use-after-free condition occurs when a CButton object is freed, but a reference
22
+ is kept and used again during a page reload, an invalid memory that's controllable
23
+ is used, and allows arbitrary code execution under the context of the user.
25
24
26
25
Please note: This vulnerability has been exploited in the wild targeting
27
26
mainly China/Taiwan/and US-based computers.
@@ -40,7 +39,8 @@ def initialize(info={})
40
39
[ 'URL' , 'http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html' ] ,
41
40
[ 'URL' , 'http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/' ] ,
42
41
[ 'URL' , 'http://blog.vulnhunt.com/index.php/2012/12/29/new-ie-0day-coming-mshtmlcdwnbindinfo-object-use-after-free-vulnerability/' ] ,
43
- [ 'URL' , 'http://technet.microsoft.com/en-us/security/advisory/2794220' ]
42
+ [ 'URL' , 'http://technet.microsoft.com/en-us/security/advisory/2794220' ] ,
43
+ [ 'URL' , 'http://blogs.technet.com/b/srd/archive/2012/12/29/new-vulnerability-affecting-internet-explorer-8-users.aspx' ]
44
44
] ,
45
45
'Payload' =>
46
46
{
0 commit comments