Internet Explorer CSS Import Rule Processing Use-After-Free Vulnerability

Posted on Monday, December 20, 2010 @ 20:40:25 CST in Security
by Raven

SECUNIA ADVISORY ID: SA42510

VERIFY ADVISORY: Secunia.com: http://secunia.com/advisories/42510/

CRITICALITY: Highly Critical

RELEASE DATE: 2010-12-21

DESCRIPTION: A vulnerability has been discovered in Internet Explorer, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a use-after-free error when processing Cascading Style Sheets (CSS) and can be exploited to dereference freed memory via e.g. a specially crafted CSS file containing multiple import rules. Successful exploitation allows execution of arbitrary code. The vulnerability is confirmed in Internet Explorer 7 and 8 on a fully patched Windows XP SP3 system.

SOLUTION: Do not browse untrusted websites.

PROVIDED AND/OR DISCOVERED BY: sec yun

ORIGINAL ADVISORY: http://www.wooyun.org/bugs/wooyun-2010-0885
 
 
click Related        click Share
 
 
Associated Topics

Internet


Microsoft
 
News ©

Site Info

Last SeenLast Seen
  • kguske
  • nextgen
Server TrafficServer Traffic
  • Total: 504,386,694
  • Today: 56,974
Server InfoServer Info
  • Mar 12, 2025
  • 06:12 am CDT