Invalid pointer reference
Michel Fortin
michel.fortin at michelf.com
Tue Jan 19 06:07:14 PST 2010
On 2010-01-19 07:17:22 -0500, Lutger <lutger.blijdestijn at gmail.com> said:
> On 01/19/2010 08:11 AM, bearophile wrote:
>> Another of those billion dollar mistakes D2 will not be able to avoid!
>>
>> http://www.microsoft.com/technet/security/advisory/979352.mspx
>>
>>> Our investigation so far has shown that Internet Explorer 5.01 Service
>>> Pack 4 on Microsoft Windows 2000 Service Pack 4 is not affected, and
>>> that Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000
>>> Service Pack 4, and Internet Explorer 6, Internet Explorer 7 and
>>> Internet Explorer 8 on supported editions of Windows XP, Windows Server
>>> 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server
>>> 2008 R2 are vulnerable. The vulnerability exists as an invalid pointer
>>> reference within Internet Explorer. It is possible under certain
>>> conditions for the invalid pointer to be accessed after an object is
>>> deleted. In a specially-crafted attack, in attempting to access a freed
>>> object, Internet Explorer can be caused to allow remote code execution.<
>>
>> In future if I can I'll keep posting here other widely destructive
>> examples of this class of bugs.
>>
>> Bye,
>> bearophile
>
> SafeD?
Almost there. But still not fully memory-safe:
<http://d.puremagic.com/issues/show_bug.cgi?id=3677>
--
Michel Fortin
michel.fortin at michelf.com
http://michelf.com/
More information about the Digitalmars-d
mailing list