Executive Summary

Informations
Name CVE-2014-8967 First vendor Publication 2014-12-15
Vendor Cve Last vendor Modification 2015-10-30

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted HTML document in conjunction with a Cascading Style Sheets (CSS) token sequence specifying the run-in value for the display property, leading to improper CElement reference counting.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8967

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28548
 
Oval ID: oval:org.mitre.oval:def:28548
Title: Internet Explorer use-after-free vulnerability - CVE-2014-8967 (MS15-009)
Description: Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted HTML document in conjunction with a Cascading Style Sheets (CSS) token sequence specifying the run-in value for the display property, leading to improper CElement reference counting.
Family: windows Class: vulnerability
Reference(s): CVE-2014-8967
Version: 4
Platform(s): Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7
Microsoft Windows Server 2008 R2
Product(s): Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Snort® IPS/IDS

Date Description
2015-03-12 Microsoft Internet Explorer CHeaderElement object use after free attempt
RuleID : 33424 - Revision : 3 - Type : BROWSER-IE
2015-03-12 Microsoft Internet Explorer CHeaderElement object use after free attempt
RuleID : 33423 - Revision : 3 - Type : BROWSER-IE
2015-01-13 Microsoft Internet Explorer CheaderElement use after free attempt
RuleID : 32778 - Revision : 3 - Type : BROWSER-IE
2015-01-13 Microsoft Internet Explorer CheaderElement use after free attempt
RuleID : 32777 - Revision : 3 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2015-06-05 Name : The remote host has a web browser installed that is affected by multiple vuln...
File : smb_nt_ms15-009.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/71483
MISC http://zerodayinitiative.com/advisories/ZDI-14-403/

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2021-05-04 12:35:22
  • Multiple Updates
2021-04-22 01:42:40
  • Multiple Updates
2020-05-23 00:42:52
  • Multiple Updates
2015-10-31 00:22:22
  • Multiple Updates
2015-03-12 21:23:42
  • Multiple Updates
2015-02-19 09:23:24
  • Multiple Updates
2015-02-11 13:23:58
  • Multiple Updates
2015-01-13 21:24:07
  • Multiple Updates
2014-12-16 17:25:52
  • Multiple Updates
2014-12-15 21:25:19
  • First insertion