Microsoft Internet Explorer 8 Use-After-Free

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1045602 漏洞类型
发布时间 2013-02-14 更新时间 2013-02-14
漏洞平台 N/A CVSS评分 N/A
= Microsoft Internet Explorer SLayoutRun Use After Free
= Author: Scott Bell <scott.bell[at]>
= Vendor Website:
= Affected Version: Microsoft Internet Explorer 8
= Advisory URL:
= Metasploit Module:

== Description ==

A Use-after-free memory corruption vulnerability was identified in
Microsoft Internet Explorer 8. This allows a malicious user to remotely
execute arbitrary code on a vulnerable users machine, in the context of
the current user. The memory corruption happens when the application of
a style sheet performs style computations on the DOM. A CParaElement
node is released but a reference is still kept in CDoc. This memory is
reused when a CDoc relayout is performed.

== Solution ==

Microsoft validated this security issue in Internet Explorer 8 and
issued a patch (MS13-009) to remedy it.
recommends applying the patch which has been made available via Windows

== About == is a leading team of Information Security
consultants specialising in providing high quality Information Security
services to clients throughout the Asia Pacific region. Our clients
include some of the largest globally recognised companies in areas such
as finance, telecommunications, broadcasting, legal and government. Our
aim is to provide the very best independent advice and a high level of
technical expertise while creating long and lasting professional
relationships with our clients. is committed to
security research and development, and its team continues to identify
and responsibly publish vulnerabilities in public and private software
vendor's products. Members of the R&D team are
globally recognised through their release of whitepapers and
presentations related to new security research.