Skip to content

Commit eed5a74

Browse files
author
jvazquez-r7
committed
description updated and reference added
1 parent f7d6594 commit eed5a74

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

modules/exploits/windows/browser/ie_cdwnbindinfo_uaf.rb

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,9 @@ def initialize(info={})
1818
'Name' => "Microsoft Internet Explorer CDwnBindInfo Object Use-After-Free Vulnerability",
1919
'Description' => %q{
2020
This module exploits a vulnerability found in Microsoft Internet Explorer. A
21-
use-after-free condition occurs when a CDwnBindInfo object is freed by
22-
FollowHyperlink2, but a reference is kept in CDoc. As a result, when the reference
23-
is used again during a page reload, an invalid memory that's controllable is used,
24-
and allows arbitrary code execution under the context of the user.
21+
use-after-free condition occurs when a CButton object is freed, but a reference
22+
is kept and used again during a page reload, an invalid memory that's controllable
23+
is used, and allows arbitrary code execution under the context of the user.
2524
2625
Please note: This vulnerability has been exploited in the wild targeting
2726
mainly China/Taiwan/and US-based computers.
@@ -40,7 +39,8 @@ def initialize(info={})
4039
[ 'URL', 'http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html'],
4140
[ 'URL', 'http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/'],
4241
[ 'URL', 'http://blog.vulnhunt.com/index.php/2012/12/29/new-ie-0day-coming-mshtmlcdwnbindinfo-object-use-after-free-vulnerability/' ],
43-
[ 'URL', 'http://technet.microsoft.com/en-us/security/advisory/2794220' ]
42+
[ 'URL', 'http://technet.microsoft.com/en-us/security/advisory/2794220' ],
43+
[ 'URL', 'http://blogs.technet.com/b/srd/archive/2012/12/29/new-vulnerability-affecting-internet-explorer-8-users.aspx' ]
4444
],
4545
'Payload' =>
4646
{

0 commit comments

Comments
 (0)