Exploit developers should be very excited recently; lots of big bombs have been dropped to the community.
In February, Yang Yu was awarded the Microsoft mitigation bypass bounty, the top prize in Microsoft Bounty Programs. He talked about parts of his mitigation bypass in his presentation at CanSecWest 2014. However, the most interesting part - the so-called “Vital Point Strike” - was just left as blurred pages in his slides.
Soonafter, another security researcher, Yuki Chen, published ExpLib2, which is Yuki’s exploitation library for Internet Explorer. It has been added to Metasploit later.
Not long after that, the famous security researcher Yuange published the technique that he calls “DVE”, which he claims to have discovered several years ago.
To our understanding, the last two techniques are talking about the same thing (for Yang Yu’s technique, we could only guess): attacking the less protected script interpreter engine in Microsoft Internet Explorer. By utilizing the script engine to execute malicious code, attackers could circumvent all modern memory protections except for the application sandbox.
more here.........http://blog.fortinet.com/Advanced-Exploit-Techniques-Attacking-the-IE-Script-Engine/
In February, Yang Yu was awarded the Microsoft mitigation bypass bounty, the top prize in Microsoft Bounty Programs. He talked about parts of his mitigation bypass in his presentation at CanSecWest 2014. However, the most interesting part - the so-called “Vital Point Strike” - was just left as blurred pages in his slides.
Soonafter, another security researcher, Yuki Chen, published ExpLib2, which is Yuki’s exploitation library for Internet Explorer. It has been added to Metasploit later.
Not long after that, the famous security researcher Yuange published the technique that he calls “DVE”, which he claims to have discovered several years ago.
To our understanding, the last two techniques are talking about the same thing (for Yang Yu’s technique, we could only guess): attacking the less protected script interpreter engine in Microsoft Internet Explorer. By utilizing the script engine to execute malicious code, attackers could circumvent all modern memory protections except for the application sandbox.
more here.........http://blog.fortinet.com/Advanced-Exploit-Techniques-Attacking-the-IE-Script-Engine/