Internet Explorer ElementNode Object Use-After-Free
XLAB ID: XLAB-15-011
CVE ID: CVE-2015-6045
Patch Status: Fixed
Vulnerability Details:
The vulnerability relates to how Internet Explorer processes the ElementNode objects. By manipulating a document’s elements an attacker can force a ElementNode object in memory to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process.
Disclosure Timeline:
2015/07/09 | Provide vulnerability detail to Micorsoft via secure@micorsoft.com |
---|---|
2015/07/13 | Micorsoft responded that they had successfully reproduced the issue, and had been working on a fix.The case number for the issue was 30619 |
2015/09/04 | Micorsoft responded that they had been working on a fix |
2015/09/18 | Microsoft asked how would you like to be acknowledged |
2015/10/14 | The issue was fiexed with MS15-106 |
Credit:
This vulnerability was discovered by: Kai Kang