Lucene search

K
saintSAINT CorporationSAINT:C8A99119E3B66AE618442F25E6C3A18D
HistorySep 19, 2012 - 12:00 a.m.

Internet Explorer CMshtmlEd execCommand Use After Free

2012-09-1900:00:00
SAINT Corporation
download.saintcorporation.com
26

0.821 High

EPSS

Percentile

98.4%

Added: 09/19/2012
CVE: CVE-2012-4969
BID: 55562
OSVDB: 85532

Background

Internet Explorer is an HTML web browser which comes by default on Microsoft operating systems.

Problem

Internet Explorer does not properly clean up references to objects passed to the execCommand Javascript method. If execCommand is called by an object’s event handler and the execCommand parameter modifies the DOM such that the parent object is modified, the parent is freed and reallocated, but references to the parent are not redirected. This can cause a use-after-free condition, which may be exploitable when combined with a heap spray.

Resolution

Apply the patch detailed in Microsoft Security Bulletin MS12-063.
Alternatively, installing the Microsoft Exploit Mitigation Experience Toolkit prevents this vulnerability from being exploited, and also improves overall security of your Windows system. To install and configure Microsoft Exploit Mitigation Experience Toolkit, following the instructions in Microsoft Security Advisory 2757760.

References

<http://technet.microsoft.com/en-us/security/bulletin/ms12-063&gt;
<http://technet.microsoft.com/en-us/security/advisory/2757760&gt;
<http://www.microsoft.com/en-us/download/details.aspx?id=29851&gt;
<http://nakedsecurity.sophos.com/2012/09/18/microsoft-advisory-internet-explorer-zero-day-affects-most-windows-versions/&gt;
<http://threatpost.com/en_us/blogs/latest-ie-zero-day-flaw-tied-nitro-hackers-and-recent-java-zero-day-exploits-091712&gt;

Limitations

This exploit has been tested against Microsoft Internet Explorer 8 and 9 on Windows XP SP3 English (DEP OptIn) and Windows 7 SP1 (DEP OptIn).

Platforms

Windows