Rapid7 Vulnerability & Exploit Database

MS13-055 Microsoft Internet Explorer CAnchorElement Use-After-Free

Back to Search

MS13-055 Microsoft Internet Explorer CAnchorElement Use-After-Free

Disclosed
07/09/2013
Created
05/30/2018

Description

In IE8 standards mode, it's possible to cause a use-after-free condition by first creating an illogical table tree, where a CPhraseElement comes after CTableRow, with the final node being a sub table element. When the CPhraseElement's outer content is reset by using either outerText or outerHTML through an event handler, this triggers a free of its child element (in this case, a CAnchorElement, but some other objects apply too), but a reference is still kept in function SRunPointer::SpanQualifier. This function will then pass on the invalid reference to the next functions, eventually used in mshtml!CElement::Doc when it's trying to make a call to the object's SecurityContext virtual function at offset +0x70, which results a crash. An attacker can take advantage of this by first creating an CAnchorElement object, let it free, and then replace the freed memory with another fake object. Successfully doing so may allow arbitrary code execution under the context of the user. This bug is specific to Internet Explorer 8 only. It was originally discovered by Jose Antonio Vazquez Gonzalez and reported to iDefense, but was discovered again by Orange Tsai at Hitcon 2013.

Author(s)

  • Jose Antonio Vazquez Gonzalez
  • Orange Tsai
  • Peter Vreugdenhil
  • sinn3r <sinn3r@metasploit.com>

Platform

Windows

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/browser/ms13_055_canchor
msf exploit(ms13_055_canchor) > show targets
    ...targets...
msf exploit(ms13_055_canchor) > set TARGET < target-id >
msf exploit(ms13_055_canchor) > show options
    ...show and set options...
msf exploit(ms13_055_canchor) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;