Multiple use-after-free vulnerabilities in Microsoft Internet Explorer 6 through 11 allow remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by Sebastian Apelt and Andreas Schmidt during a Pwn2Own competition at CanSecWest 2014.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://www.pwn2own.com/2014/03/pwn2own-results-thursday-day-two/ | broken link |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037 | vendor advisory |
http://twitter.com/thezdi/statuses/444216845734666240 | press/media coverage |
http://secunia.com/advisories/59775 | third party advisory |
http://www.securitytracker.com/id/1030532 | vdb entry |