[Owasp-Recife] The mechanism behind Internet Explorer CVE-2014-1776

Caio Dias caio.dias at owasp.org
Fri May 16 21:02:42 UTC 2014


Recently Microsoft
patched<https://technet.microsoft.com/library/security/ms14-021> an
Internet Explorer use-after-free bug (CVE-2014-1776) that was being
exploited in the wild. Since then I’ve seen several reports of new variants
based on the original exploit appearing ITW. Let’s look deep inside the
exploitation mechanism to see how it works to make a use-after-free execute
shellcode.

Continue lendo em:
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/The-mechanism-behind-Internet-Explorer-CVE-2014-1776-exploits/ba-p/6476220#.U3Y5DfldV8E


-- 

[image: Caio Dias on about.me]

Caio Dias
about.me/caiodias

<http://about.me/caiodias>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-recife/attachments/20140516/13f9b219/attachment.html>


More information about the Owasp-recife mailing list