Executive Summary
Informations | |||
---|---|---|---|
Name | TA14-318A | First vendor Publication | 2014-11-14 |
Vendor | US-CERT | Last vendor Modification | 2014-11-14 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Overview A vulnerability in Microsoft Windows Object Linking and Embedding (OLE) could allow remote code execution if a user views a specially-crafted web page in Internet Explorer.[1] DescriptionThe Microsoft Windows OLE OleAut32.dll library provides the SafeArrayRedim function that allows resizing of SAFEARRAY objects in memory.[2] In certain circumstances, this library does not properly check sizes of arrays when an error occurs. The improper size allows an attacker to manipulate memory in a way that can bypass the Internet Explorer Enhanced Protected Mode (EPM) sandbox as well as the Enhanced Mitigation Experience Toolkit (EMET). This vulnerability can be exploited using a specially-crafted web page utilizing VBscript in Internet Explorer. However, it may impact other software that makes use of OleAut32.dll and VBscript. Exploit code is publicly available for this vulnerability. Additional details may be found in CERT/CC Vulnerability Note VU#158647. ImpactArbitrary code can be run on the computer with user privileges. If the user is an administrator, the attacker may run arbitrary code as an administrator, fully compromising the system. SolutionAn update is available from Microsoft.[3] Please see Microsoft Security Bulletin MS14-064 for more details and mitigation guidance, and apply the necessary updates. |
Original Source
Url : http://www.us-cert.gov/cas/techalerts/TA14-318A.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
50 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:27794 | |||
Oval ID: | oval:org.mitre.oval:def:27794 | ||
Title: | Microsoft schannel remote code execution vulnerability - CVE-2014-6321 (MS14-066) | ||
Description: | Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via crafted packets, aka "Microsoft Schannel Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-6321 | Version: | 5 |
Platform(s): | Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows 8.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28046 | |||
Oval ID: | oval:org.mitre.oval:def:28046 | ||
Title: | Windows OLE automation array remote code execution vulnerability - CVE-2014-6332 (MS14-064) | ||
Description: | OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted web site, as demonstrated by an array-redimensioning attempt that triggers improper handling of a size value in the SafeArrayDimen function, aka "Windows OLE Automation Array Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-6332 | Version: | 5 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2012 Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 3 | |
Os | 2 | |
Os | 1 |
SAINT Exploits
Description | Link |
---|---|
Windows OLE Automation Array command execution | More info here |
ExploitDB Exploits
id | Description |
---|---|
2014-11-13 | Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF) |
2014-11-13 | Internet Explorer <11 - OLE Automation Array Remote Code Execution |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2014-11-13 | IAVM : 2014-A-0171 - Multiple Vulnerabilities in Windows OLE Severity : Category I - VMSKEY : V0057379 |
2014-11-13 | IAVM : 2014-A-0176 - Microsoft Secure Channel Remote Code Execution Vulnerability (MS14-066) Severity : Category I - VMSKEY : V0057389 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-08-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 50707 - Revision : 1 - Type : OS-WINDOWS |
2019-08-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 50706 - Revision : 1 - Type : OS-WINDOWS |
2019-08-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 50705 - Revision : 1 - Type : OS-WINDOWS |
2019-08-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 50704 - Revision : 1 - Type : OS-WINDOWS |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49977 - Revision : 1 - Type : OS-WINDOWS |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49976 - Revision : 1 - Type : OS-WINDOWS |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49975 - Revision : 1 - Type : OS-WINDOWS |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49974 - Revision : 1 - Type : OS-WINDOWS |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49973 - Revision : 1 - Type : OS-WINDOWS |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49972 - Revision : 1 - Type : OS-WINDOWS |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49971 - Revision : 1 - Type : OS-WINDOWS |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49970 - Revision : 1 - Type : OS-WINDOWS |
2019-05-30 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 49969 - Revision : 1 - Type : OS-WINDOWS |
2016-03-14 | Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt RuleID : 36896 - Revision : 2 - Type : BROWSER-IE |
2016-03-14 | Known exploit kit obfuscation routine detected RuleID : 36824 - Revision : 2 - Type : EXPLOIT-KIT |
2015-05-12 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 34058 - Revision : 2 - Type : OS-WINDOWS |
2015-05-12 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 34057 - Revision : 2 - Type : OS-WINDOWS |
2015-04-30 | Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt RuleID : 33980 - Revision : 2 - Type : BROWSER-IE |
2015-04-30 | Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt RuleID : 33979 - Revision : 2 - Type : BROWSER-IE |
2015-02-24 | Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt RuleID : 33116 - Revision : 3 - Type : BROWSER-IE |
2015-02-24 | Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt RuleID : 33115 - Revision : 3 - Type : BROWSER-IE |
2015-01-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 32732 - Revision : 2 - Type : OS-WINDOWS |
2015-01-13 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 32731 - Revision : 2 - Type : OS-WINDOWS |
2015-01-06 | Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt RuleID : 32630 - Revision : 3 - Type : BROWSER-IE |
2015-01-06 | Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt RuleID : 32629 - Revision : 3 - Type : BROWSER-IE |
2014-12-18 | Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt RuleID : 32565 - Revision : 4 - Type : BROWSER-IE |
2014-12-18 | Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt RuleID : 32564 - Revision : 4 - Type : BROWSER-IE |
2014-12-11 | Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt RuleID : 32473 - Revision : 4 - Type : BROWSER-IE |
2014-12-11 | Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt RuleID : 32472 - Revision : 4 - Type : BROWSER-IE |
2014-12-11 | Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt RuleID : 32471 - Revision : 4 - Type : BROWSER-IE |
2014-12-11 | Microsoft Internet Explorer 11 VBScript redim preserve denial-of-service attempt RuleID : 32470 - Revision : 4 - Type : BROWSER-IE |
2014-12-09 | Microsoft Windows DTLSv1.0 hello verify request out of bounds read attempt RuleID : 32423 - Revision : 3 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows DTLSv1.0 handshake cookie buffer overflow attempt RuleID : 32422 - Revision : 3 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows SChannel ECDH key exchange heap overflow attempt RuleID : 32421 - Revision : 3 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows SChannel ECDH key exchange heap overflow attempt RuleID : 32420 - Revision : 3 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows SChannel ECDH key exchange heap overflow attempt RuleID : 32419 - Revision : 3 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows SChannel ECDH key exchange heap overflow attempt RuleID : 32418 - Revision : 2 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 32417 - Revision : 5 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 32416 - Revision : 6 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 32415 - Revision : 5 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 32414 - Revision : 6 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows ECDSA certificate validation bypass attempt RuleID : 32413 - Revision : 3 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows ECDSA certificate validation bypass attempt RuleID : 32412 - Revision : 3 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows ECDSA certificate validation bypass attempt RuleID : 32411 - Revision : 3 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 32410 - Revision : 4 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows SChannel CertificateVerify buffer overflow attempt RuleID : 32409 - Revision : 4 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows ECDSA certificate validation bypass attempt RuleID : 32408 - Revision : 3 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows ECDSA certificate validation bypass attempt RuleID : 32407 - Revision : 3 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows ECDSA certificate validation bypass attempt RuleID : 32406 - Revision : 3 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows ECDSA certificate validation bypass attempt RuleID : 32405 - Revision : 3 - Type : OS-WINDOWS |
2014-12-09 | Microsoft Windows ECDSA certificate validation bypass attempt RuleID : 32404 - Revision : 3 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-11-12 | Name : The remote Windows host is affected by a remote code execution vulnerability. File : smb_nt_ms14-066.nasl - Type : ACT_GATHER_INFO |
2014-11-11 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms14-064.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-11-20 09:29:27 |
|
2014-11-15 05:31:59 |
|
2014-11-14 21:23:40 |
|