Internet Explorer ElementNode Object Use-After-Free

XLAB ID: XLAB-15-011     

CVE ID: CVE-2015-6045     

Patch Status: Fixed

Vulnerability Details:
The vulnerability relates to how Internet Explorer processes the ElementNode objects. By manipulating a document’s elements an attacker can force a ElementNode object in memory to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process.

Disclosure Timeline:

2015/07/09 Provide vulnerability detail to Micorsoft via
2015/07/13 Micorsoft responded that they had successfully reproduced the issue,
and had been working on a fix.The case number for the issue was 30619
2015/09/04 Micorsoft responded that they had been working on a fix
2015/09/18 Microsoft asked how would you like to be acknowledged
2015/10/14 The issue was fiexed with MS15-106

This vulnerability was discovered by:   Kai Kang