Overview
Microsoft Internet Explorer contains a use-after-free vulnerability, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
Microsoft Internet Explorer contains a use-after-free vulnerability. This can allow for arbitrary code execution. Internet Explorer versions 6 through 11 are affected. Note that this vulnerability is being exploited in the wild. Although no Adobe Flash vulnerability appears to be at play here, the Internet Explorer vulnerability is used to corrupt Flash content in a way that allows ASLR to be bypassed via a memory address leak. This is made possible with Internet Explorer because Flash runs within the same process space as the browser. Note that exploitation without the use of Flash may be possible. |
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code. |
Solution
Apply an update |
Use the Microsoft Enhanced Mitigation Experience Toolkit
Important: For this workaround to take effect, you MUST run it from an elevated command prompt. A dialog box should appear after the command is run to confirm that the un-registration process has succeeded. Click OK to close the dialog box.
For 64-bit Windows systems Note The following commands must be entered from an elevated command prompt. A dialog box should appear after each command is run to confirm that the un-registration process has succeeded. Click OK to close the dialog box. Impact of Workaround: Applications that render VML will no longer do so once vgx.dll has been unregistered. Note that the vulnerability does not reside in VGX.DLL. This library is used in current exploits, so unregistering it will prevent those specific exploits from working, rather than blocking access to the vulnerability. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Temporal | 9.5 | E:H/RL:W/RC:C |
Environmental | 9.5 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- https://technet.microsoft.com/library/security/ms14-021
- https://technet.microsoft.com/en-US/library/security/2963983
- http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/
- http://blogs.technet.com/b/srd/archive/2014/04/30/protection-strategies-for-the-security-advisory-2963983-ie-0day.aspx
- http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html
- http://www.fireeye.com/blog/technical/targeted-attack/2014/05/operation-clandestine-fox-now-attacking-windows-xp-using-recently-discovered-ie-vulnerability.html
Acknowledgements
This vulnerability was publicly reported by FireEye
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2014-1776 |
Date Public: | 2014-04-26 |
Date First Published: | 2014-04-27 |
Date Last Updated: | 2014-05-07 17:34 UTC |
Document Revision: | 54 |