Executive Summary

Summary
Title Microsoft Security Advisory 2963983
Informations
Name KB2963983 First vendor Publication 2014-04-26
Vendor Microsoft Last vendor Modification 2014-05-01
Severity (Vendor) N/A Revision 1.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Microsoft Security Advisory 2963983

Vulnerability in Internet Explorer Could Allow Remote Code Execution

Published: April 26, 2014 | Updated: May 1, 2014

Version: 2.0

General Information

Executive Summary

Microsoft has completed the investigation into a public report of this vulnerability. We have issued MS14-021 to address this issue. For more information about this issue, including download links for an available security update, please review MS14-021. The vulnerability addressed is the Internet Explorer Memory Corruption Vulnerability - CVE-2014-1776.

Acknowledgments

Microsoft thanks the following for working with us to help protect customers:

  • FireEye, Inc. for working with us on the Internet Explorer Memory Corruption Vulnerability (CVE-2014-1776)

Other Information

Microsoft Active Protections Program (MAPP)

To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections websites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.

Feedback

  • You can provide feedback by completing the Microsoft Help and Support form, Customer Service Contact Us.

Support

  • Customers in the United States and Canada can receive technical support from Security Support. For more information, see Microsoft Help and Support.
  • International customers can receive support from their local Microsoft subsidiaries. For more information, see International Support.
  • Microsoft TechNet Security provides additional information about security in Microsoft products.

Disclaimer

The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

Revisions

  • V1.0 (April 26, 2014): Advisory published.
  • V1.1 (April 29, 2014): Updated advisory to clarify workarounds to help prevent exploitation of the vulnerability described in this advisory.
  • V2.0 (May 1, 2014): Advisory updated to reflect publication of security bulletin.

Page generated 2014-05-01 9:59Z-07:00.

Original Source

Url : http://www.microsoft.com/technet/security/advisory/2963983.mspx

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:24704
 
Oval ID: oval:org.mitre.oval:def:24704
Title: Internet Explorer Memory corruption vulnerability (CVE-2014-1776) - MS14-021
Description: Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks."
Family: windows Class: vulnerability
Reference(s): CVE-2014-1776
Version: 6
Platform(s): Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Product(s): Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 6

Information Assurance Vulnerability Management (IAVM)

Date Description
2014-05-01 IAVM : 2014-A-0065 - Microsoft Internet Explorer Memory Corruption Vulnerability
Severity : Category I - VMSKEY : V0050205

Snort® IPS/IDS

Date Description
2019-05-26 Microsoft Internet Explorer VML use after free attempt
RuleID : 49940 - Revision : 2 - Type : BROWSER-IE
2014-12-02 Microsoft Internet Explorer VML use after free attempt
RuleID : 32363 - Revision : 3 - Type : BROWSER-IE
2014-12-02 Microsoft Internet Explorer VML use after free attempt
RuleID : 32362 - Revision : 3 - Type : BROWSER-IE
2014-06-07 known malicious flash actionscript decryption routine
RuleID : 30901 - Revision : 3 - Type : FILE-FLASH
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30895 - Revision : 4 - Type : BROWSER-IE
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30894 - Revision : 4 - Type : BROWSER-IE
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30893 - Revision : 3 - Type : BROWSER-IE
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30892 - Revision : 3 - Type : BROWSER-IE
2014-05-28 Microsoft Internet Explorer VML use after free attempt
RuleID : 30803 - Revision : 6 - Type : BROWSER-IE
2014-05-28 Microsoft Internet Explorer VML use after free attempt
RuleID : 30794 - Revision : 7 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2014-05-01 Name : The remote host has a web browser that is affected by a memory corruption vul...
File : smb_nt_ms14-021.nasl - Type : ACT_GATHER_INFO
2014-04-28 Name : The remote host is affected by a remote code execution vulnerability.
File : smb_kb2963983.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-08-19 11:19:13
  • First insertion