CVE-2011-1255
CRITICALCVSS Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
Lifecycle Timeline
4Description
The Timed Interactive Multimedia Extensions (aka HTML+TIME) implementation in Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Time Element Memory Corruption Vulnerability."
Analysis
Internet Explorer 6 through 8 contain a memory corruption vulnerability in the HTML+TIME (Timed Interactive Multimedia Extensions) implementation. Accessing improperly initialized or deleted time element objects allows remote attackers to execute arbitrary code through crafted web pages.
Technical Context
The SMIL-based HTML+TIME implementation fails to properly manage object lifetimes. Accessing a time element that was freed or not initialized triggers a use-after-free condition controllable by the attacker through JavaScript DOM manipulation. The corrupted vtable pointer redirects execution to attacker-supplied shellcode.
Affected Products
['Internet Explorer 6', 'Internet Explorer 7', 'Internet Explorer 8']
Remediation
Migrate to a modern browser. If IE is required for legacy apps, restrict browsing to trusted intranet sites only. Apply MS11-050 security update. Deploy EMET/Exploit Guard mitigations.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today