cve/2008/CVE-2008-4844.md

23 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2008-4844](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4844)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and exploited in the wild in December 2008.
### POC
#### Reference
- http://isc.sans.org/diary.html?storyid=5458
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-078
- https://www.exploit-db.com/exploits/7403
- https://www.exploit-db.com/exploits/7410
- https://www.exploit-db.com/exploits/7477
- https://www.exploit-db.com/exploits/7583
#### Github
- https://github.com/reversinglabs/reversinglabs-sdk-py3