Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and exploited in the wild in December 2008.
- http://isc.sans.org/diary.html?storyid=5458
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-078
- https://www.exploit-db.com/exploits/7403
- https://www.exploit-db.com/exploits/7410
- https://www.exploit-db.com/exploits/7477
- https://www.exploit-db.com/exploits/7583
- https://github.com/reversinglabs/reversinglabs-sdk-py3