Four zero-day flaws found in Internet Explorer (IE) can affect different elements of the browser all of which are exploitable via drive-by attacks.
One of the flaws is an AddRow Out-Of-Bounds Memory Access vulnerability that affects the way that IE manages specific displays. It is considered very critical by the experts.
An advisory issued by the Zero Day Initiative says the vulnerability allows remote attackers to execute arbitrary code of vulnerable installations of IE. It also affects Windows Phone. The attack requests the user interaction and targeted users must visit a malicious page or open a malicious file to set off the exploits.
“The vulnerability relates to how IE processes arrays representing cells in HTML tables. An attacker can force Internet Explorer to use memory past the end of an array of HTML cells,”states the advisory.
Another critical flaw of the set is one that exists within the handling of CAttrArray objects. By manipulating a document's elements an attacker can force reuse of a dangling pointer after its been freed, as stated by the advisory.
The remaining two flaws are very similar. Both are related to the IE mishandling CTreePos and CCurrentStyle objects in some situations.