← Zuruck zu CVEs
CVE-2014-0322
HIGHCISA KEV8.8
Beschreibung
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014.
CVE Details
CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht2/14/2014
Zuletzt geandert4/22/2026
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerMicrosoft
ProduktInternet Explorer
SchwachstellennameMicrosoft Internet Explorer Use-After-Free Vulnerability
KEV Aufnahmedatum2022-05-04
Behebungsfrist2022-05-25
Ransomware-NutzungUnknown
Betroffene Produkte
microsoft:internet_explorermicrosoft:windows_7microsoft:windows_8microsoft:windows_rtmicrosoft:windows_server_2008microsoft:windows_server_2012microsoft:windows_vista
Schwachen (CWE)
CWE-416CWE-416
Referenzen
http://community.websense.com/blogs/securitylabs/archive/2014/02/13/msie-0-day-exploit-cve-2014-0322-possibly-targeting-french-aerospace-organization.aspx(secure@microsoft.com)
http://technet.microsoft.com/security/advisory/2934088(secure@microsoft.com)
http://twitter.com/nanoc0re/statuses/434251658344673281(secure@microsoft.com)
http://www.exploit-db.com/exploits/32851(secure@microsoft.com)
http://www.exploit-db.com/exploits/32904(secure@microsoft.com)
http://www.fireeye.com/blog/technical/cyber-exploits/2014/02/new-ie-zero-day-found-in-watering-hole-attack-2.html(secure@microsoft.com)
http://www.fireeye.com/blog/uncategorized/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html(secure@microsoft.com)
http://www.kb.cert.org/vuls/id/732479(secure@microsoft.com)
http://www.osvdb.org/103354(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-012(secure@microsoft.com)
https://www.dropbox.com/s/pyxjgycmudirbqe/CVE-2014-0322.zip(secure@microsoft.com)
http://community.websense.com/blogs/securitylabs/archive/2014/02/13/msie-0-day-exploit-cve-2014-0322-possibly-targeting-french-aerospace-organization.aspx(af854a3a-2127-422b-91ae-364da2661108)
http://technet.microsoft.com/security/advisory/2934088(af854a3a-2127-422b-91ae-364da2661108)
http://twitter.com/nanoc0re/statuses/434251658344673281(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/32851(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/32904(af854a3a-2127-422b-91ae-364da2661108)
http://www.fireeye.com/blog/technical/cyber-exploits/2014/02/new-ie-zero-day-found-in-watering-hole-attack-2.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.fireeye.com/blog/uncategorized/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/732479(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/103354(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-012(af854a3a-2127-422b-91ae-364da2661108)
https://www.dropbox.com/s/pyxjgycmudirbqe/CVE-2014-0322.zip(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-0322(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.