Invalid pointer reference

bearophile bearophileHUGS at lycos.com
Mon Jan 18 23:11:40 PST 2010


Another of those billion dollar mistakes D2 will not be able to avoid!

http://www.microsoft.com/technet/security/advisory/979352.mspx

>Our investigation so far has shown that Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service Pack 4 is not affected, and that Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and Internet Explorer 6, Internet Explorer 7 and Internet Explorer 8 on supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are vulnerable. The vulnerability exists as an invalid pointer reference within Internet Explorer. It is possible under certain conditions for the invalid pointer to be accessed after an object is deleted. In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution.<

In future if I can I'll keep posting here other widely destructive examples of this class of bugs.

Bye,
bearophile



More information about the Digitalmars-d mailing list