Lucene search

K
zdiVUPENZDI-14-190
HistoryJun 11, 2014 - 12:00 a.m.

(Pwn2Own) Microsoft Internet Explorer Protected Mode Bypass Vulnerability

2014-06-1100:00:00
VUPEN
www.zerodayinitiative.com
13

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.391 Low

EPSS

Percentile

97.2%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of data shared to the broker by the sandboxed process. The issue lies in the failure to validate an object’s type. An attacker can leverage this vulnerability to execute code as the context of the current user at medium integrity.

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.391 Low

EPSS

Percentile

97.2%