TROYANOSYVIRUS
Back to CVEs

CVE-2014-6332

HIGHCISA KEV
8.8

Description

OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted web site, as demonstrated by an array-redimensioning attempt that triggers improper handling of a size value in the SafeArrayDimen function, aka "Windows OLE Automation Array Remote Code Execution Vulnerability."

CVE Details

CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published11/11/2014
Last Modified4/22/2026
Sourcekev
Honeypot Sightings0

CISA KEV

VendorMicrosoft
ProductWindows
Vulnerability NameMicrosoft Windows Object Linking & Embedding (OLE) Automation Array Remote Code Execution Vulnerability
KEV Date Added2022-03-25
Remediation Due Date2022-04-15
Ransomware UseUnknown

Affected Products

microsoft:windows_7microsoft:windows_8microsoft:windows_8.1microsoft:windows_rtmicrosoft:windows_rt_8.1microsoft:windows_server_2003microsoft:windows_server_2008microsoft:windows_server_2012microsoft:windows_vista

Weaknesses (CWE)

CWE-119CWE-119

References

http://www.kb.cert.org/vuls/id/158647(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/70952(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1031184(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/ncas/alerts/TA14-318B(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/37668/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/37800/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/38500/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/38512/(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.