Invalid pointer reference

Michel Fortin michel.fortin at michelf.com
Tue Jan 19 06:07:14 PST 2010


On 2010-01-19 07:17:22 -0500, Lutger <lutger.blijdestijn at gmail.com> said:

> On 01/19/2010 08:11 AM, bearophile wrote:
>> Another of those billion dollar mistakes D2 will not be able to avoid!
>> 
>> http://www.microsoft.com/technet/security/advisory/979352.mspx
>> 
>>> Our investigation so far has shown that Internet Explorer 5.01 Service 
>>> Pack 4 on Microsoft Windows 2000 Service Pack 4 is not affected, and 
>>> that Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 
>>> Service Pack 4, and Internet Explorer 6, Internet Explorer 7 and 
>>> Internet Explorer 8 on supported editions of Windows XP, Windows Server 
>>> 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 
>>> 2008 R2 are vulnerable. The vulnerability exists as an invalid pointer 
>>> reference within Internet Explorer. It is possible under certain 
>>> conditions for the invalid pointer to be accessed after an object is 
>>> deleted. In a specially-crafted attack, in attempting to access a freed 
>>> object, Internet Explorer can be caused to allow remote code execution.<
>> 
>> In future if I can I'll keep posting here other widely destructive 
>> examples of this class of bugs.
>> 
>> Bye,
>> bearophile
> 
> SafeD?

Almost there. But still not fully memory-safe:
<http://d.puremagic.com/issues/show_bug.cgi?id=3677>


-- 
Michel Fortin
michel.fortin at michelf.com
http://michelf.com/




More information about the Digitalmars-d mailing list