Vulnerability Name:

CVE-2014-6332

Assigned:2014-09-11
Published:2014-11-11
Updated:2017-09-16
Summary:OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted web site, as demonstrated by an array-redimensioning attempt that triggers improper handling of a size value in the SafeArrayDimen function, aka "Windows OLE Automation Array Remote Code Execution Vulnerability."
CVSS v3 Severity:9.0 Critical (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-94
References:Source: MISC
Type: UNKNOWN
http://packetstormsecurity.com/files/134053/Avant-Browser-Lite-Ultimate-Remote-Code-Execution.html

Source: MISC
Type: UNKNOWN
http://packetstormsecurity.com/files/134061/The-World-Browser-3.0-Final-Remote-Code-Execution.html

Source: MISC
Type: UNKNOWN
http://packetstormsecurity.com/files/134062/HTML-Compiler-Remote-Code-Execution.html

Source: MISC
Type: UNKNOWN
http://packetstormsecurity.com/files/134064/Microsoft-Compiled-HTML-Help-Remote-Code-Execution.html

Source: MISC
Type: UNKNOWN
http://packetstormsecurity.com/files/134079/Winamp-Bento-Browser-Remote-Code-Execution.html

Source: MISC
Type: UNKNOWN
http://securityintelligence.com/ibm-x-force-researcher-finds-significant-vulnerability-in-microsoft-windows

Source: MS
Type: VENDOR_ADVISORY
http://technet.microsoft.com/security/bulletin/MS14-064

Source: CERT-VN
Type: VENDOR_ADVISORY
http://www.kb.cert.org/vuls/id/158647

Source: BID
Type: UNKNOWN
70952

Source: SECTRACK
Type: UNKNOWN
1031184

Source: CERT
Type: VENDOR_ADVISORY
http://www.us-cert.gov/ncas/alerts/TA14-318B

Source: MISC
Type: UNKNOWN
https://forsec.nl/wp-content/uploads/2014/11/ms14_064_ie_olerce.rb_.txt

Source: EXPLOIT-DB
Type: UNKNOWN
37668

Source: EXPLOIT-DB
Type: UNKNOWN
37800

Source: EXPLOIT-DB
Type: UNKNOWN
38500

Source: EXPLOIT-DB
Type: UNKNOWN
38512

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_server_2003::sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008::sp2:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_8:-:-:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_8:-:-:x86:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_8.1:-:-:~-~-~-~x64~:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_8.1:-:-:~-~-~-~x86~:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_rt:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_rt:-:gold:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*

  • Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:28046
    V
    Windows OLE automation array remote code execution vulnerability - CVE-2014-6332 (MS14-064)
    2014-12-29
    BACK
    microsoft windows_server_2003 sp2
    microsoft windows_server_2008 sp2
    microsoft windows_server_2012 - gold
    microsoft windows_server_2012 r2
    microsoft windows_server_2008 r2 sp1
    microsoft windows_7 - sp1
    microsoft windows_8 - -
    microsoft windows_8 - -
    microsoft windows_8.1 - -
    microsoft windows_8.1 - -
    microsoft windows_rt -
    microsoft windows_rt_8.1 -
    microsoft windows_rt - gold
    microsoft windows_vista - sp2