Lucene search

K
saintSAINT CorporationSAINT:D8D6BCBC7A7819EE47BC5E6D40059708
HistoryApr 17, 2014 - 12:00 a.m.

Internet Explorer CMarkup Object Handling Use-after-free Vulnerability

2014-04-1700:00:00
SAINT Corporation
download.saintcorporation.com
14

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%

Added: 04/17/2014
CVE: CVE-2014-0322
BID: 65551
OSVDB: 103354

Background

Internet Explorer is an HTML web browser which comes by default on Microsoft operating systems.

Problem

Microsoft Internet Explorer 9 and 10 contain a use-after-free vulnerability in the CMarkup component of the MSHTML library. By enticing a user to open a specially crafted web page, a remote attacker could upload and execute arbitrary code on the compromised user’s system.

This exploit in the wild uses the Internet Explorer vulnerability to corrupt Adobe Flash content in such a way as to bypass Address Space Layout Randomization (ASLR), disable Data Execution Prevention (DEP), and then execute code.

Resolution

Apply updates as specified in Microsoft Security Bulletin MS14-012.

References

<http://secunia.com/advisories/56974/&gt;
<http://www.kb.cert.org/vuls/id/732479&gt;

Limitations

The user must open the exploit page in MS IE 9 or 10.

Exploit was tested using Adobe Flash Player 12.0.0.70 and 12.0.0.77.

Platforms

Windows

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%