TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Four RCE Zero-Day Flaws Plague Internet Explorer

54 点作者 hackinsider将近 10 年前

7 条评论

amaks将近 10 年前
&quot;Microsoft was initially given a May 12, 2015 deadline, but this deadline was extended to July 19 at the vendor’s request. Since the company failed to meet this deadline, ZDI has decided to inform users of the existence of this flaw.&quot;<p>I would expect Microsoft to handle security vulnerabilities with a higher priority. Not sure why they are dropping this on the floor.
评论 #9937642 未加载
评论 #9937523 未加载
sago将近 10 年前
I&#x27;m not a &#x27;security researcher&#x27;, and have only a technical layman&#x27;s grasp of the issue, but:<p>&gt; &quot;By manipulating a document&#x27;s elements an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process,”<p>The first and second sentence there feels like an &#x27;and then a miracle happens&#x27; argument (<a href="http:&#x2F;&#x2F;star.psy.ohio-state.edu&#x2F;coglab&#x2F;Miracle.html" rel="nofollow">http:&#x2F;&#x2F;star.psy.ohio-state.edu&#x2F;coglab&#x2F;Miracle.html</a>). I get that, in some cases dangling pointers might allow you to get a bit of uploaded data to be treated like a bit of internal data. But it seems to me like a piece of extraordinary unlikely bad luck to allow this to execute arbitrary code.<p>So I don&#x27;t dismiss that there is a theoretical risk, but can anyone suggest how much risk is in these risks. In particular, is the risk of such an exploit greater than the risk of an exploiter finding a new weakness? If not, then I can understand why there is no great urgency to patch these flaws.
评论 #9936734 未加载
评论 #9937017 未加载
评论 #9936951 未加载
评论 #9937707 未加载
terminado将近 10 年前
So, does this affect Windows 10 and the new Edge web browser?
评论 #9938012 未加载
orand将近 10 年前
RCE stands for Remote Code Execution
MichaelGG将近 10 年前
WTF? Microsoft must have known what would happen. This isn&#x27;t 1999 anymore. Did they just call HP&#x27;s bluff? I was under the impression that MS was generally doing a fairly good job as far as taking these reports seriously.
eugeneionesco将近 10 年前
They didn&#x27;t drop anything. You cannot reproduce the vulnerabilities from the details they published.
na85将近 10 年前
How embarassing. I think it&#x27;s hubris at this point that keeps Internet Explorer alive. I think it&#x27;s been obvious for years that Microsoft just doesn&#x27;t have the engineering talent to make a decent browser. It&#x27;s time they bow out of that particular arena and focus on areas where they are strong.
评论 #9937577 未加载