Executive Summary

Summary
Title Microsoft Internet Explorer CMarkup use-after-free vulnerability
Informations
Name VU#222929 First vendor Publication 2014-04-27
Vendor VU-CERT Last vendor Modification 2014-05-07
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#222929

Microsoft Internet Explorer CMarkup use-after-free vulnerability

Original Release date: 27 Apr 2014 | Last revised: 07 May 2014

Overview

Microsoft Internet Explorer contains a use-after-free vulnerability, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Description

Microsoft Internet Explorer contains a use-after-free vulnerability. This can allow for arbitrary code execution. Internet Explorer versions 6 through 11 are affected.

Note that this vulnerability is being exploited in the wild. Although no Adobe Flash vulnerability appears to be at play here, the Internet Explorer vulnerability is used to corrupt Flash content in a way that allows ASLR to be bypassed via a memory address leak. This is made possible with Internet Explorer because Flash runs within the same process space as the browser. Note that exploitation without the use of Flash may be possible.

Impact

By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code.

Solution

Apply an update

This issue is addressed in the update for Microsoft Security Bulletin MS14-021. This update is available via Windows Update. Please also consider the following workarounds:

Use the Microsoft Enhanced Mitigation Experience Toolkit

The Microsoft Enhanced Mitigation Experience Toolkit (EMET) can be used to help prevent exploitation of this vulnerability. Note that platforms that do not support ASLR, such as Windows XP and Windows Server 2003, will not receive the same level of protection that modern Windows platforms will.

Unregister VGX.DLL

Microsoft provides guidance to unregister VGX.DLL:

    For 32-bit Windows systems

    Important: For this workaround to take effect, you MUST run it from an elevated command prompt.
    1. From an elevated command prompt enter the following command:
    "%SystemRoot%\System32\regsvr32.exe" -u "%CommonProgramFiles%\Microsoft Shared\VGX\vgx.dll"

    A dialog box should appear after the command is run to confirm that the un-registration process has succeeded. Click OK to close the dialog box.

    2. Close and reopen Internet Explorer for the changes to take effect..

    For 64-bit Windows systems

    NoteThe following commands must be entered from an elevated command prompt.
    1. From an elevated command prompt enter the following commands:
    "%SystemRoot%\System32\regsvr32.exe" -u "%CommonProgramFiles%\Microsoft Shared\VGX\vgx.dll"

    "%SystemRoot%\System32\regsvr32.exe" -u "%CommonProgramFiles(x86)%\Microsoft Shared\VGX\vgx.dll"

    A dialog box should appear after each command is run to confirm that the un-registration process has succeeded. Click OK to close the dialog box.
    2. Close and reopen Internet Explorer for the changes to take effect.

    Impact of Workaround: Applications that render VML will no longer do so once vgx.dll has been unregistered.


Note that the vulnerability does not reside in VGX.DLL. This library is used in current exploits, so unregistering it will prevent those specific exploits from working, rather than blocking access to the vulnerability.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-01 May 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base10.0AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal9.5E:H/RL:W/RC:C
Environmental9.5CDP:ND/TD:H/CR:ND/IR:ND/AR:ND

References

  • https://technet.microsoft.com/library/security/ms14-021
  • https://technet.microsoft.com/en-US/library/security/2963983
  • http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/
  • http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for-the-security-advisory-2963983-ie-0day.aspx
  • http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html
  • http://www.fireeye.com/blog/technical/targeted-attack/2014/05/operation-clandestine-fox-now-attacking-windows-xp-using-recently-discovered-ie-vulnerability.html

Credit

This vulnerability was publicly reported by FireEye

This document was written by Will Dormann.

Other Information

  • CVE IDs:CVE-2014-1776
  • Date Public:26 Apr 2014
  • Date First Published:27 Apr 2014
  • Date Last Updated:07 May 2014
  • Document Revision:54

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/222929

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:24704
 
Oval ID: oval:org.mitre.oval:def:24704
Title: Internet Explorer Memory corruption vulnerability (CVE-2014-1776) - MS14-021
Description: Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks."
Family: windows Class: vulnerability
Reference(s): CVE-2014-1776
Version: 6
Platform(s): Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows 8.1
Product(s): Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 6

Information Assurance Vulnerability Management (IAVM)

Date Description
2014-05-01 IAVM : 2014-A-0065 - Microsoft Internet Explorer Memory Corruption Vulnerability
Severity : Category I - VMSKEY : V0050205

Snort® IPS/IDS

Date Description
2019-05-26 Microsoft Internet Explorer VML use after free attempt
RuleID : 49940 - Revision : 2 - Type : BROWSER-IE
2014-12-02 Microsoft Internet Explorer VML use after free attempt
RuleID : 32363 - Revision : 3 - Type : BROWSER-IE
2014-12-02 Microsoft Internet Explorer VML use after free attempt
RuleID : 32362 - Revision : 3 - Type : BROWSER-IE
2014-06-07 known malicious flash actionscript decryption routine
RuleID : 30901 - Revision : 3 - Type : FILE-FLASH
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30895 - Revision : 4 - Type : BROWSER-IE
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30894 - Revision : 4 - Type : BROWSER-IE
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30893 - Revision : 3 - Type : BROWSER-IE
2014-05-31 Microsoft Internet Explorer VML use after free attempt
RuleID : 30892 - Revision : 3 - Type : BROWSER-IE
2014-05-28 Microsoft Internet Explorer VML use after free attempt
RuleID : 30803 - Revision : 6 - Type : BROWSER-IE
2014-05-28 Microsoft Internet Explorer VML use after free attempt
RuleID : 30794 - Revision : 7 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2014-05-01 Name : The remote host has a web browser that is affected by a memory corruption vul...
File : smb_nt_ms14-021.nasl - Type : ACT_GATHER_INFO
2014-04-28 Name : The remote host is affected by a remote code execution vulnerability.
File : smb_kb2963983.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Date Informations
2014-05-07 21:22:49
  • Multiple Updates
2014-05-07 00:28:19
  • Multiple Updates
2014-05-02 17:20:05
  • Multiple Updates
2014-05-02 13:24:14
  • Multiple Updates
2014-05-02 00:18:32
  • Multiple Updates
2014-05-01 21:19:25
  • Multiple Updates
2014-05-01 17:18:22
  • Multiple Updates
2014-04-30 21:19:12
  • Multiple Updates
2014-04-30 17:17:55
  • Multiple Updates
2014-04-30 00:18:08
  • Multiple Updates
2014-04-29 13:21:18
  • Multiple Updates
2014-04-28 21:25:35
  • Multiple Updates
2014-04-28 21:20:09
  • Multiple Updates
2014-04-28 00:18:14
  • Multiple Updates
2014-04-27 17:22:33
  • Multiple Updates
2014-04-27 17:18:16
  • First insertion