Lucene search

K
zdiSimon Zuckerbraun of Trend Micro Zero Day InitiativeZDI-18-1130
HistoryOct 10, 2018 - 12:00 a.m.

Microsoft Windows VBScript Class_Terminate MSXML6 Use-After-Free Remote Code Execution Vulnerability

2018-10-1000:00:00
Simon Zuckerbraun of Trend Micro Zero Day Initiative
www.zerodayinitiative.com
10

EPSS

0.131

Percentile

95.6%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows VBScript. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Class_Terminate methods when used together with MSXML6. By performing actions in VBScript, an attacker can cause a pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code in the context of the current process.