Vulnerability Note VU#222929
Microsoft Internet Explorer use-after-free vulnerability
Overview
Microsoft Internet Explorer contains a use-after-free vulnerability, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
Microsoft Internet Explorer contains a use-after-free vulnerability. This can allow for arbitrary code execution. Internet Explorer versions 6 through 11 are affected.
Note that this vulnerability is being exploited in the wild. Although no Adobe Flash vulnerability appears to be at play here, the Internet Explorer vulnerability is used to corrupt Flash content in a way that allows ASLR to be bypassed via a memory address leak. This is made possible with Internet Explorer because Flash runs within the same process space as the browser. Note that exploitation without the use of Flash may be possible.
|
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code.
|
Solution
We are currently unaware of a practical solution to this problem. Please consider the following workarounds:
|
Use the Microsoft Enhanced Mitigation Experience Toolkit
The Microsoft Enhanced Mitigation Experience Toolkit (EMET) can be used to help prevent exploitation of this vulnerability. CERT/CC has created a video tutorial for setting up EMET 3.0 on Windows 7. Note that platforms that do not support ASLR, such as Windows XP and Windows Server 2003, will not receive the same level of protection that modern Windows platforms will. |
Vendor Information (Learn More)
Vendor | Status | Date Notified | Date Updated |
---|---|---|---|
Microsoft Corporation | Affected | - | 27 Apr 2014 |
CVSS Metrics (Learn More)
Group | Score | Vector |
---|---|---|
Base | 10.0 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Temporal | 9.5 | E:H/RL:W/RC:C |
Environmental | 9.5 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- https://technet.microsoft.com/en-US/library/security/2963983
- http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html
Credit
This vulnerability was publicly reported by FireEye
This document was written by Will Dormann.
Other Information
- CVE IDs: CVE-2014-1776
- Date Public: 26 Apr 2014
- Date First Published: 27 Apr 2014
- Date Last Updated: 27 Apr 2014
- Document Revision: 6
Feedback
If you have feedback, comments, or additional information about this vulnerability, please send us email.
No comments:
Post a Comment