CVE-2014-1776

Scores

EPSS

0.785medium78.5%
0%20%40%60%80%100%

Percentile: 78.5%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that “VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks.”

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-416

Related Vulnerabilities

Exploits

Exploit ID: CVE-2014-1776

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Recommendations

Source: nvd

Apply an updateThis issue is addressed in the update for Microsoft Security Bulletin MS14-021. This update is available via Windows Update. Please also consider the following workarounds:Use the Microsoft Enhanced Mitigation Experience ToolkitThe Microsoft Enhanced Mitigation Experience Toolkit (EMET) can be used to help prevent exploitation of this vulnerability. Note that platforms that do not support ASLR, such as Windows XP and Windows Server 2003, will not receive the same level of protection that modern Windows platforms will.Unregister VGX.DLLMicrosoft provides guidance to unregister VGX.DLL:For 32-bit Windows systemsImportant: For this workaround to take effect, you MUST run it from an elevated command prompt.1. From an elevated command prompt enter the following command: “%SystemRoot%\System32\regsvr32.exe” -u “%CommonProgramFiles%\Microsoft Shared\VGX\vgx.dll”A dialog box should appear after the command is run to confirm that the un-registration process has succeeded. Click OK to close the dialog box.2. Close and reopen Internet Explorer for the changes to take effect.. For 64-bit Windows systemsNote The following commands must be entered from an elevated command prompt.1. From an elevated command prompt enter the following commands: “%SystemRoot%\System32\regsvr32.exe” -u “%CommonProgramFiles%\Microsoft Shared\VGX\vgx.dll”“%SystemRoot%\System32\regsvr32.exe” -u “%CommonProgramFiles(x86)%\Microsoft Shared\VGX\vgx.dll”A dialog box should appear after each command is run to confirm that the un-registration process has succeeded. Click OK to close the dialog box.2. Close and reopen Internet Explorer for the changes to take effect.Impact of Workaround: Applications that render VML will no longer do so once vgx.dll has been unregistered.Note that the vulnerability does not reside in VGX.DLL. This library is used in current exploits, so unregistering it will prevent those specific exploits from working, rather than blocking access to the vulnerability.

URL: http://www.kb.cert.org/vuls/id/222929

Vulnerable Software (6)

Type: Configuration

Vendor: microsoft

Product: internet_explorer

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": ...

Source: nvd

Type: Configuration

Vendor: microsoft

Product: internet_explorer

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": ...

Source: nvd

Type: Configuration

Vendor: microsoft

Product: internet_explorer

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": ...

Source: nvd

Type: Configuration

Vendor: microsoft

Product: internet_explorer

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": ...

Source: nvd

Type: Configuration

Vendor: microsoft

Product: internet_explorer

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator":...

Source: nvd

Type: Configuration

Vendor: microsoft

Product: internet_explorer

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator":...

Source: nvd