← Volver a CVEs
CVE-2014-1776
CRITICALCISA KEV9.8
Descripcion
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks."
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado4/27/2014
Ultima modificacion4/21/2026
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorMicrosoft
ProductoInternet Explorer
Nombre vulnerabilidadMicrosoft Internet Explorer Memory Corruption Vulnerability
Fecha inclusion KEV2022-01-28
Fecha limite remediacion2022-07-28
Uso en ransomwareUnknown
Productos afectados
microsoft:internet_explorermicrosoft:windows_7microsoft:windows_8microsoft:windows_8.1microsoft:windows_rtmicrosoft:windows_rt_8.1microsoft:windows_server_2003microsoft:windows_server_2008microsoft:windows_server_2012microsoft:windows_vistamicrosoft:windows_xp
Debilidades (CWE)
CWE-416CWE-416
Referencias
http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for-the-security-advisory-2963983-ie-0day.aspx(secure@microsoft.com)
http://secunia.com/advisories/57908(secure@microsoft.com)
http://securitytracker.com/id?1030154(secure@microsoft.com)
http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html(secure@microsoft.com)
http://www.kb.cert.org/vuls/id/222929(secure@microsoft.com)
http://www.osvdb.org/106311(secure@microsoft.com)
http://www.securityfocus.com/bid/67075(secure@microsoft.com)
http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-021(secure@microsoft.com)
https://technet.microsoft.com/library/security/2963983(secure@microsoft.com)
http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for-the-security-advisory-2963983-ie-0day.aspx(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/57908(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1030154(af854a3a-2127-422b-91ae-364da2661108)
http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/222929(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/106311(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/67075(af854a3a-2127-422b-91ae-364da2661108)
http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-021(af854a3a-2127-422b-91ae-364da2661108)
https://technet.microsoft.com/library/security/2963983(af854a3a-2127-422b-91ae-364da2661108)
https://www.vicarius.io/vsociety/posts/cve-2014-1776-use-after-free-vulnerability-in-microsoft-internet-explorer-detection-script(af854a3a-2127-422b-91ae-364da2661108)
https://www.vicarius.io/vsociety/posts/cve-2014-1776-use-after-free-vulnerability-in-microsoft-internet-explorer-mitigation-scripts(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-1776(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.