BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

IE10 Use-After-Free 0day

Disclosed February 13, 2014    Fully Patched

Vulnerability Description:

Internet Explorer 10 contains a use-after-free vulnerability that allows a remote attacker to modify one byte of memory at an arbitrary address. An attacker may use this to bypass ASLR and DEP, thereby allowing an attacker to arbitrarily execute code within the context of the currently logged on user.

Vendors:

Microsoft

Vulnerable Software/Devices:

Internet Explorer 10

Vulnerability Severity:

High

Exploit Availability:

N/A

Exploit Impact:

Remote Code Execution
Remote Code Execution Exploitation of this vulnerability is possible through the use of methods like drive-by attacks. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 33146 - Microsoft Internet Explorer Cumulative Security Update (2925418)
  • 33147 - Microsoft Internet Explorer Cumulative Security Update (2925418) - x64

Mitigation:

Apply MS14-012.

Links:

CVE(s):

None