Executive Summary

Summary
Title Internet Explorer CMarkup use-after-free vulnerability
Informations
Name VU#732479 First vendor Publication 2014-02-14
Vendor VU-CERT Last vendor Modification 2014-02-19
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#732479

Internet Explorer CMarkup use-after-free vulnerability

Original Release date: 14 Feb 2014 | Last revised: 19 Feb 2014

Overview

Microsoft Internet Explorer contains a use-after-free vulnerability in the MSHTML CMarkup component, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Description

Microsoft Internet Explorer contains a use-after-free vulnerability in the CMarkup component of the MSHTML library. This can allow for arbitrary code execution. We have confirmed Internet Explorer 10 to be vulnerable. It has been reported that Internet Explorer 9 is also affected. Other versions of Internet Explorer may also be affected.

Note that this vulnerability is being exploited in the wild, and the exploit code is publicly available. The exploit in the wild currently only targets Internet Explorer 10 on systems that have Adobe Flash installed and do not have EMET installed. Windows 8 comes with Flash, so no additional software is required to be vulnerable to this particular exploit on that platform. Although no Flash vulnerability appears to be at play here, the Internet Explorer vulnerability is used to corrupt Flash content in a way that allows ASLR to be bypassed via a memory address leak. This is made possible with Internet Explorer because Flash runs within the same process space as the browser. The Flash content uses this ASLR bypass to disable DEP and then execute code. The Microsoft.XMLDOM ActiveX control is used to determine if EMET is installed on the target system. This is done by checking for the presence of C:\Windows\AppPatch\EMET.dll. If this file is present, the exploit attempt is aborted.

Impact

By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code.

Solution

Install the Microsoft Fix it
Microsoft Security Advisory (2934088) has been released to describe this issue. This advisory references a Fix it utility to address this vulnerability.

Please also consider the following workarounds:

Use the Microsoft Enhanced Mitigation Experience Toolkit

The Microsoft Enhanced Mitigation Experience Toolkit (EMET) can be used to help prevent exploitation of this vulnerability. CERT/CC has created a video tutorial for setting up EMET 3.0 on Windows 7. Note that platforms that do not support ASLR, such as Windows XP and Windows Server 2003, will not receive the same level of protection that modern Windows platforms will.

Update to Internet Explorer 11

The public exploit for this vulnerability does not work with Internet Explorer 11.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected14 Feb 201419 Feb 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base10.0AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal9.5E:H/RL:W/RC:C
Environmental9.5CDP:ND/TD:H/CR:ND/IR:ND/AR:ND

References

  • http://www.kb.cert.org/vuls/id/539289
  • http://technet.microsoft.com/en-us/security/advisory/2934088
  • http://blogs.technet.com/b/srd/archive/2014/02/19/fix-it-tool-available-to-block-internet-explorer-attacks-leveraging-cve-2014-0322.aspx
  • http://www.fireeye.com/blog/uncategorized/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html
  • http://community.websense.com/blogs/securitylabs/archive/2014/02/14/msie-0-day-exploit-cve-2014-0322-possibly-targeting-french-aerospace-organization.aspx
  • http://arstechnica.com/security/2014/02/new-zero-day-bug-in-ie-10-exploited-in-active-malware-attack-ms-warns/
  • http://www.seculert.com/blog/2014/02/0-day-attack-targets-aerospace-companys-remote-users.html
  • http://soroush.secproject.com/blog/2013/04/microsoft-xmldom-in-ie-can-divulge-information-of-local-drivenetwork-in-error-messages/
  • https://sites.google.com/site/zerodayresearch/smashing_the_heap_with_vector_Li.pdf

Credit

This vulnerability was publicly reported by FireEye.

This document was written by Will Dormann.

Other Information

  • CVE IDs:CVE-2014-0322
  • Date Public:13 Feb 2014
  • Date First Published:14 Feb 2014
  • Date Last Updated:19 Feb 2014
  • Document Revision:46

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/732479

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:22660
 
Oval ID: oval:org.mitre.oval:def:22660
Title: Internet Explorer Memory Corruption Vulnerability (CVE-2014-0322) - MS14-012
Description: Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014.
Family: windows Class: vulnerability
Reference(s): CVE-2014-0322
Version: 6
Platform(s): Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows 7
Microsoft Windows 8
Product(s): Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2

SAINT Exploits

Description Link
Internet Explorer CMarkup Object Handling Use-after-free Vulnerability More info here

ExploitDB Exploits

id Description
2014-04-16 MS14-012 Microsoft Internet Explorer CMarkup Use-After-Free
2014-04-14 MS14-012 Internet Explorer CMarkup Use-After-Free

Information Assurance Vulnerability Management (IAVM)

Date Description
2014-03-13 IAVM : 2014-A-0037 - Cumulative Security Update for Microsoft Internet Explorer
Severity : Category I - VMSKEY : V0046163

Snort® IPS/IDS

Date Description
2016-06-01 Microsoft Internet Explorer onpropertychange use-after-free attempt
RuleID : 38670 - Revision : 2 - Type : BROWSER-IE
2016-06-01 Microsoft Internet Explorer onpropertychange use-after-free attempt
RuleID : 38669 - Revision : 2 - Type : BROWSER-IE
2015-02-18 Microsoft Internet Explorer 10 use after free attempt
RuleID : 33086 - Revision : 5 - Type : BROWSER-IE
2015-02-18 Microsoft Internet Explorer 10 use after free attempt
RuleID : 33085 - Revision : 5 - Type : BROWSER-IE
2014-04-10 Microsoft Internet Explorer 10 use after free attempt
RuleID : 30107 - Revision : 5 - Type : BROWSER-IE
2014-04-10 Microsoft Internet Explorer 10 use after free attempt
RuleID : 30106 - Revision : 5 - Type : BROWSER-IE
2014-03-16 Microsoft Internet Explorer 10 use after free attempt
RuleID : 29820 - Revision : 7 - Type : BROWSER-IE
2014-03-16 Microsoft Internet Explorer 10 use after free attempt
RuleID : 29819 - Revision : 7 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2014-03-11 Name : The remote host has a web browser that is affected by multiple vulnerabilities.
File : smb_nt_ms14-012.nasl - Type : ACT_GATHER_INFO
2014-02-20 Name : The remote host is affected by a remote code execution vulnerability.
File : smb_kb2934088.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2015-04-09 13:29:17
  • Multiple Updates
2014-02-21 13:21:13
  • Multiple Updates
2014-02-20 05:24:15
  • Multiple Updates
2014-02-19 21:19:31
  • Multiple Updates
2014-02-19 17:18:19
  • Multiple Updates
2014-02-18 21:25:10
  • Multiple Updates
2014-02-18 05:18:06
  • Multiple Updates
2014-02-16 21:19:03
  • Multiple Updates
2014-02-15 17:18:15
  • Multiple Updates
2014-02-15 00:18:16
  • Multiple Updates
2014-02-14 21:24:49
  • Multiple Updates
2014-02-14 21:19:12
  • First insertion