Executive Summary

Summary
TitleVulnerability in Windows Media Center Could Allow Remote Code Execution (2978742)
Informations
NameMS14-043First vendor Publication2014-08-12
VendorMicrosoftLast vendor Modification2014-08-12
Severity (Vendor) CriticalRevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score6.8Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical
Revision Note: V1.0 (August 12, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file that invokes Windows Media Center resources.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS14-043

CWE : Common Weakness Enumeration

%idName
100 %CWE-416Use After Free

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:26275
 
Oval ID: oval:org.mitre.oval:def:26275
Title: CSyncBasePlayer use after free vulnerability - CVE-2014-4060 (MS14-043)
Description: Use-after-free vulnerability in MCPlayer.dll in Microsoft Windows Media Center TV Pack for Windows Vista, Windows 7 SP1, and Windows Media Center for Windows 8 and 8.1 allows remote attackers to execute arbitrary code via a crafted Office document that triggers deletion of a CSyncBasePlayer object, aka "CSyncBasePlayer Use After Free Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2014-4060
Version: 6
Platform(s): Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Microsoft Windows Vista
Product(s): Microsoft Windows Media Center
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1
Application1
Os12
Os1
Os1
Os1

Information Assurance Vulnerability Management (IAVM)

DateDescription
2014-08-14IAVM : 2014-B-0110 - Microsoft Windows Media Center Remote Code Execution Vulnerability
Severity : Category II - VMSKEY : V0053823

Nessus® Vulnerability Scanner

DateDescription
2014-08-12Name : The remote Windows host is affected by a remote code execution vulnerability.
File : smb_nt_ms14-043.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
DateInformations
2015-10-18 17:26:19
  • Multiple Updates
2014-08-14 09:25:13
  • Multiple Updates
2014-08-13 13:24:59
  • Multiple Updates
2014-08-13 05:25:45
  • Multiple Updates
2014-08-12 21:29:08
  • Multiple Updates
2014-08-12 21:17:58
  • First insertion