Lucene search

K
zdiSkyLinedZDI-15-515
HistoryOct 13, 2015 - 12:00 a.m.

Microsoft Windows JavaScript Regular Expression Use-After-Free Remote Code Execution Vulnerability

2015-10-1300:00:00
SkyLined
www.zerodayinitiative.com
17

EPSS

0.944

Percentile

99.2%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability relates to search and replace operations performed using JavaScript regular expressions. An attacker can cause the in-memory representation of a regular expression to be freed while it is being used in a replace operation. An attacker can leverage this vulnerability to execute code under the context of the current process.