Executive Summary

Informations
Name CVE-2014-1776 First vendor Publication 2014-04-27
Vendor Cve Last vendor Modification 2018-10-12

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1776

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:24704
 
Oval ID: oval:org.mitre.oval:def:24704
Title: Internet Explorer Memory corruption vulnerability (CVE-2014-1776) - MS14-021
Description: Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks."
Family: windows Class: vulnerability
Reference(s): CVE-2014-1776
Version: 6
Platform(s): Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Product(s): Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 6

Information Assurance Vulnerability Management (IAVM)

Date Description
2014-05-01 IAVM : 2014-A-0065 - Microsoft Internet Explorer Memory Corruption Vulnerability
Severity : Category I - VMSKEY : V0050205

Snort® IPS/IDS

Date Description
2019-05-26 Microsoft Internet Explorer VML use after free attempt
RuleID : 49940 - Revision : 2 - Type : BROWSER-IE
2014-12-02 Microsoft Internet Explorer VML use after free attempt
RuleID : 32363 - Revision : 3 - Type : BROWSER-IE
2014-12-02 Microsoft Internet Explorer VML use after free attempt
RuleID : 32362 - Revision : 3 - Type : BROWSER-IE
2014-06-07 known malicious flash actionscript decryption routine
RuleID : 30901 - Revision : 3 - Type : FILE-FLASH
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30895 - Revision : 4 - Type : BROWSER-IE
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30894 - Revision : 4 - Type : BROWSER-IE
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30893 - Revision : 3 - Type : BROWSER-IE
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30892 - Revision : 3 - Type : BROWSER-IE
2014-05-28 Microsoft Internet Explorer VML use after free attempt
RuleID : 30803 - Revision : 6 - Type : BROWSER-IE
2014-05-28 Microsoft Internet Explorer VML use after free attempt
RuleID : 30794 - Revision : 7 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2014-05-01 Name : The remote host has a web browser that is affected by a memory corruption vul...
File : smb_nt_ms14-021.nasl - Type : ACT_GATHER_INFO
2014-04-28 Name : The remote host is affected by a remote code execution vulnerability.
File : smb_kb2963983.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/67075
CERT-VN http://www.kb.cert.org/vuls/id/222929
CONFIRM http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for-t...
https://technet.microsoft.com/library/security/2963983
MISC http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-target...
http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14...
OSVDB http://www.osvdb.org/106311
SECTRACK http://securitytracker.com/id?1030154
SECUNIA http://secunia.com/advisories/57908

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Date Informations
2021-05-04 12:30:25
  • Multiple Updates
2021-04-22 01:37:13
  • Multiple Updates
2020-05-23 00:40:17
  • Multiple Updates
2018-10-13 05:18:44
  • Multiple Updates
2016-09-06 17:24:18
  • Multiple Updates
2016-06-28 22:37:37
  • Multiple Updates
2016-04-27 00:23:54
  • Multiple Updates
2014-12-02 21:25:50
  • Multiple Updates
2014-06-07 21:22:28
  • Multiple Updates
2014-05-31 21:22:27
  • Multiple Updates
2014-05-28 21:22:32
  • Multiple Updates
2014-05-16 09:22:28
  • Multiple Updates
2014-05-14 17:22:22
  • Multiple Updates
2014-05-09 17:22:29
  • Multiple Updates
2014-05-07 13:27:32
  • Multiple Updates
2014-05-07 00:23:59
  • Multiple Updates
2014-05-02 13:24:09
  • Multiple Updates
2014-04-29 13:21:17
  • Multiple Updates
2014-04-28 21:22:06
  • Multiple Updates
2014-04-27 17:19:31
  • First insertion