Description: Author:
=======
Mzer0 : http://www.4xsecurityteam.com https://twitter.com/4xsecurityteam
Tested on Windows XP SP3 With IE 8
--------------------------------------------------------
Description:
----------------
This module exploits a vulnerability found in Microsoft Internet Explorer.
A use-after-free condition occurs when a CButton object is freed,
but a reference is kept and used again during a page reload, an
invalid memory that's controllable is used, and allows arbitrary
code execution under the context of the user.
Please note: This vulnerability has been exploited in the wild targeting
ainly China/Taiwan/and US-based computers
Tags: Metasploit , ie8 , 0day , microst ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.