CVE-2014-1776

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks."
References
Link Resource
http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for-the-security-advisory-2963983-ie-0day.aspx Broken Link Mitigation
http://secunia.com/advisories/57908 Broken Link
http://securitytracker.com/id?1030154 Broken Link Third Party Advisory VDB Entry
http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html Broken Link
http://www.kb.cert.org/vuls/id/222929 Mitigation Third Party Advisory US Government Resource
http://www.osvdb.org/106311 Broken Link
http://www.securityfocus.com/bid/67075 Broken Link Third Party Advisory VDB Entry
http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/ Exploit Third Party Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-021 Patch Vendor Advisory
https://technet.microsoft.com/library/security/2963983 Mitigation Patch Vendor Advisory
http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for-the-security-advisory-2963983-ie-0day.aspx Broken Link Mitigation
http://secunia.com/advisories/57908 Broken Link
http://securitytracker.com/id?1030154 Broken Link Third Party Advisory VDB Entry
http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html Broken Link
http://www.kb.cert.org/vuls/id/222929 Mitigation Third Party Advisory US Government Resource
http://www.osvdb.org/106311 Broken Link
http://www.securityfocus.com/bid/67075 Broken Link Third Party Advisory VDB Entry
http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/ Exploit Third Party Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-021 Patch Vendor Advisory
https://technet.microsoft.com/library/security/2963983 Mitigation Patch Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:05

Type Values Removed Values Added
References () http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for-the-security-advisory-2963983-ie-0day.aspx - Broken Link, Mitigation () http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for-the-security-advisory-2963983-ie-0day.aspx - Broken Link, Mitigation
References () http://secunia.com/advisories/57908 - Broken Link () http://secunia.com/advisories/57908 - Broken Link
References () http://securitytracker.com/id?1030154 - Broken Link, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1030154 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html - Broken Link () http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html - Broken Link
References () http://www.kb.cert.org/vuls/id/222929 - Mitigation, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/222929 - Mitigation, Third Party Advisory, US Government Resource
References () http://www.osvdb.org/106311 - Broken Link () http://www.osvdb.org/106311 - Broken Link
References () http://www.securityfocus.com/bid/67075 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/67075 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/ - Exploit, Third Party Advisory () http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/ - Exploit, Third Party Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-021 - Patch, Vendor Advisory () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-021 - Patch, Vendor Advisory
References () https://technet.microsoft.com/library/security/2963983 - Mitigation, Patch, Vendor Advisory () https://technet.microsoft.com/library/security/2963983 - Mitigation, Patch, Vendor Advisory

24 Jul 2024, 16:47

Type Values Removed Values Added
CPE cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*
cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
References () http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for-the-security-advisory-2963983-ie-0day.aspx - Mitigation () http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for-the-security-advisory-2963983-ie-0day.aspx - Broken Link, Mitigation
References () http://secunia.com/advisories/57908 - () http://secunia.com/advisories/57908 - Broken Link
References () http://securitytracker.com/id?1030154 - () http://securitytracker.com/id?1030154 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.osvdb.org/106311 - () http://www.osvdb.org/106311 - Broken Link
References () http://www.securityfocus.com/bid/67075 - VDB Entry () http://www.securityfocus.com/bid/67075 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/ - Third Party Advisory () http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/ - Exploit, Third Party Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-021 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-021 - Patch, Vendor Advisory
CVSS v2 : 10.0
v3 : unknown
v2 : 10.0
v3 : 9.8
First Time Microsoft windows Rt 8.1
Microsoft windows Xp
Microsoft windows Server 2003
Microsoft windows Server 2008
Microsoft windows 7
Microsoft windows 8
Microsoft windows Rt
Microsoft windows Server 2012
Microsoft windows 8.1
Microsoft windows Vista

Information

Published : 2014-04-27 10:55

Updated : 2024-11-21 02:05


NVD link : CVE-2014-1776

Mitre link : CVE-2014-1776

CVE.ORG link : CVE-2014-1776


JSON object : View

Products Affected

microsoft

  • windows_8
  • windows_server_2012
  • windows_8.1
  • windows_7
  • windows_xp
  • windows_rt_8.1
  • windows_rt
  • internet_explorer
  • windows_server_2008
  • windows_vista
  • windows_server_2003
CWE
CWE-416

Use After Free