Vulnerability Name: | CVE-2014-0322 (CCN-91101) | ||||||||
Assigned: | 2013-12-03 | ||||||||
Published: | 2014-02-13 | ||||||||
Updated: | 2018-10-12 | ||||||||
Summary: | Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 7.7 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
7.7 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-416 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MISC Type: Permissions Required http://community.websense.com/blogs/securitylabs/archive/2014/02/13/msie-0-day-exploit-cve-2014-0322-possibly-targeting-french-aerospace-organization.aspx Source: CCN Type: Websense Security Labs Blog MSIE 0-day Exploit CVE-2014-0322 - Possibly Targeting French Aerospace Association Source: MITRE Type: CNA CVE-2014-0322 Source: CCN Type: SA56974 Microsoft Internet Explorer CMarkup Use-After-Free Vulnerability Source: CCN Type: Microsoft Security Advisory (2934088) Vulnerability in Internet Explorer Could Allow Remote Code Execution Source: CCN Type: Microsoft Security Bulletin MS14-012 Cumulative Security Update for Internet Explorer (2925418) Source: CCN Type: Microsoft Security Bulletin MS14-018 Cumulative Security Update for Internet Explorer (2950467) Source: CCN Type: Microsoft Security Bulletin MS14-035 Cumulative Security Update for Internet Explorer (2969262) Source: CCN Type: Microsoft Security Bulletin MS14-037 Cumulative Security Update for Internet Explorer (2975687) Source: CCN Type: Microsoft Security Bulletin MS14-051 Cumulative Security Update for Internet Explorer (2976627) Source: CONFIRM Type: Mitigation, Patch, Vendor Advisory http://technet.microsoft.com/security/advisory/2934088 Source: MISC Type: Press/Media Coverage http://twitter.com/nanoc0re/statuses/434251658344673281 Source: CCN Type: Microsoft Web site Internet Explorer Source: EXPLOIT-DB Type: Exploit 32851 Source: EXPLOIT-DB Type: Exploit 32904 Source: MISC Type: Broken Link http://www.fireeye.com/blog/technical/cyber-exploits/2014/02/new-ie-zero-day-found-in-watering-hole-attack-2.html Source: MISC Type: Broken Link http://www.fireeye.com/blog/uncategorized/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html Source: CCN Type: IBM Security Solutions Protection Alert Microsoft Internet Explorer Use After Free Vulnerability Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#732479 Source: OSVDB Type: UNKNOWN 103354 Source: CCN Type: BID-65551 Microsoft Internet Explorer CVE-2014-0322 Use-After-Free Remote Code Execution Vulnerability Source: MS Type: UNKNOWN MS14-012 Source: XF Type: UNKNOWN ms-ie-cve20140322-code-exec(91101) Source: MISC Type: Exploit https://www.dropbox.com/s/pyxjgycmudirbqe/CVE-2014-0322.zip | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |