← Zuruck zu CVEs
CVE-2014-1776
CRITICALCISA KEV9.8
Beschreibung
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks."
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht4/27/2014
Zuletzt geandert4/21/2026
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerMicrosoft
ProduktInternet Explorer
SchwachstellennameMicrosoft Internet Explorer Memory Corruption Vulnerability
KEV Aufnahmedatum2022-01-28
Behebungsfrist2022-07-28
Ransomware-NutzungUnknown
Betroffene Produkte
microsoft:internet_explorermicrosoft:windows_7microsoft:windows_8microsoft:windows_8.1microsoft:windows_rtmicrosoft:windows_rt_8.1microsoft:windows_server_2003microsoft:windows_server_2008microsoft:windows_server_2012microsoft:windows_vistamicrosoft:windows_xp
Schwachen (CWE)
CWE-416CWE-416
Referenzen
http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for-the-security-advisory-2963983-ie-0day.aspx(secure@microsoft.com)
http://secunia.com/advisories/57908(secure@microsoft.com)
http://securitytracker.com/id?1030154(secure@microsoft.com)
http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html(secure@microsoft.com)
http://www.kb.cert.org/vuls/id/222929(secure@microsoft.com)
http://www.osvdb.org/106311(secure@microsoft.com)
http://www.securityfocus.com/bid/67075(secure@microsoft.com)
http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-021(secure@microsoft.com)
https://technet.microsoft.com/library/security/2963983(secure@microsoft.com)
http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for-the-security-advisory-2963983-ie-0day.aspx(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/57908(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1030154(af854a3a-2127-422b-91ae-364da2661108)
http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/222929(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/106311(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/67075(af854a3a-2127-422b-91ae-364da2661108)
http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-021(af854a3a-2127-422b-91ae-364da2661108)
https://technet.microsoft.com/library/security/2963983(af854a3a-2127-422b-91ae-364da2661108)
https://www.vicarius.io/vsociety/posts/cve-2014-1776-use-after-free-vulnerability-in-microsoft-internet-explorer-detection-script(af854a3a-2127-422b-91ae-364da2661108)
https://www.vicarius.io/vsociety/posts/cve-2014-1776-use-after-free-vulnerability-in-microsoft-internet-explorer-mitigation-scripts(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-1776(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.