Microsoft Internet Explorer Multiple Vulnerabilities


Description   Multiple vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.
1) A use-after-free error when handling CQuotes objects can be exploited to corrupt memory.
2) A use-after-free error when handling CSecurityContext objects can be exploited to corrupt memory.
3) A use-after-free error when handling the relation between two CSS stylesheets can be exploited to corrupt memory.
4) Another unspecified error can be exploited to corrupt memory.
5) A boundary error within the "CPtsTextParaclient::GetApeCorners()" function can be exploited to corrupt memory.
6) A use-after-free error when handling CElement objects can be exploited to corrupt memory.
7) A boundary error within the "GetReplacedUrlImgCtxCookie()" function can be exploited to corrupt memory.
8) A type confusion error when handling DOMStringMap objects can be exploited to corrupt memory.
9) A use-after-free error when handling CHeaderElement objects can be exploited to corrupt memory.
10) Another unspecified error can be exploited to corrupt memory.
Successful exploitation of the vulnerabilities #1 through #10 allows execution of arbitrary code.
11) Two unspecified errors can be exploited to bypass certain security restrictions.
12) An unspecified error can be exploited to disclose certain cross-domain information.
13) Another unspecified error can be exploited to disclose certain cross-domain information.
14) Another unspecified error can be exploited to disclose certain cross-domain information.
15) An unspecified error can be exploited to disclose certain clipboard information.
16) An unspecified error can be exploited to bypass the Address Space Layout Randomization (ASLR) security feature.
     
Vulnerable Products   Vulnerable Software:
Microsoft Internet Explorer 10.xMicrosoft Internet Explorer 11.xMicrosoft Internet Explorer 6.xMicrosoft Internet Explorer 7.xMicrosoft Internet Explorer 8.xMicrosoft Internet Explorer 9.x
     
Solution   Apply update.-- Internet Explorer 6 --Windows Server 2003 Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=0997ba07-679c-4d2e-8824-a6aeb713c205Windows Server 2003 x64 Edition Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=cf83afca-9f80-4e38-aa5e-0d5d1a3cefe9Windows Server 2003 with SP2 for Itanium-based Systems: http://www.microsoft.com/downloads/details.aspx?FamilyID=811659d9-af35-434e-b28b-33c1289b2958-- Internet Explorer 7 --Windows Server 2003 Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=5f751387-3b4f-4c2d-bb9c-28e0708367aeWindows Server 2003 x64 Edition Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=8A209899-8FC0-423B-891E-42F177948F31Windows Server 2003 with SP2 for Itanium-based Systems: http://www.microsoft.com/downloads/details.aspx?FamilyID=6259D6E0-968C-40AA-8CA7-A965272F858AWindows Vista Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=356AD182-6F20-4D06-970C-4F652C0A0164Windows Vista x64 Edition Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=dbdacc8f-b9f1-4303-882f-3c4d7be31149Windows Server 2008 for 32-bit Systems Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=7A0DB099-9DAE-47B2-99A5-4893FEEF9304Windows Server 2008 for x64-based Systems Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=6AA3E3DE-8AE3-4640-B30D-D38DE18A41C3Windows Server 2008 for Itanium-based Systems Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=393EB6B8-C7C1-4AF9-85F7-5CE41E565728-- Internet Explorer 8 --Windows Server 2003 Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=E071B7A6-DB6B-42C6-90A1-FEB96D7C4853Windows Server 2003 x64 Edition Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=CBD73D4D-0AAA-4D0E-BDAF-C91C6A28CC9AWindows Vista Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=58E7F3DB-31B1-4426-B352-9590A39F99C6Windows Vista x64 Edition Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=66CF2068-A8CB-4AB1-B63F-2EA1FAE1BA35Windows Server 2008 for 32-bit Systems Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=D697A57F-4FAB-4003-B3B4-66DE9BB69860Windows Server 2008 for x64-based Systems Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=8E65CFB2-C949-42F1-B2A0-4F391865BBBFWindows 7 for 32-bit Systems Service Pack 1: http://www.microsoft.com/downloads/details.aspx?FamilyID=331CB7D7-A480-405E-8FB1-5E86A5BCF461Windows 7 for x64-based Systems Service Pack 1: http://www.microsoft.com/downloads/details.aspx?FamilyID=734987B8-73B0-4950-929F-BCA3924CEC5EWindows Server 2008 R2 for x64-based Systems Service Pack 1: http://www.microsoft.com/downloads/details.aspx?FamilyID=38D26B7E-D87C-412C-BC69-02D67D9D74BAWindows Server 2008 R2 for Itanium-based Systems Service Pack 1: http://www.microsoft.com/downloads/details.aspx?FamilyID=73E9DF84-35B0-45F6-AA3B-9957E7B4FBD4-- Internet Explorer 9 --Windows Vista Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=25BE4138-891D-4AF9-A8BE-864AF2015C40Windows Vista x64 Edition Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=D9698EC0-4608-451B-8FDB-A5484C8F72A6Windows Server 2008 for 32-bit Systems Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=BE9A7671-F9F7-46F0-B7BD-B912E632928FWindows Server 2008 for x64-based Systems Service Pack 2: http://www.microsoft.com/downloads/details.aspx?FamilyID=949D7253-8B4B-44A3-ABCC-1FAF1F699CD4Windows 7 for 32-bit Systems Service Pack 1: http://www.microsoft.com/downloads/details.aspx?FamilyID=0AF970C1-D6F7-493E-B689-B294FCDB46D9Windows 7 for x64-based Systems Service Pack 1: http://www.microsoft.com/downloads/details.aspx?FamilyID=C0416330-60BA-4539-AD07-6BE654FF616FWindows Server 2008 R2 for x64-based Systems Service Pack 1: http://www.microsoft.com/downloads/details.aspx?FamilyID=CA134F0F-C7BF-43F5-8751-FBB6213E435C-- Internet Explorer 10 --Windows 7 for 32-bit Systems Service Pack 1: http://www.microsoft.com/downloads/details.aspx?FamilyID=BB709123-40F0-4C1C-AE1B-51E752C7F7A7Windows 7 for x64-based Systems Service Pack 1: http://www.microsoft.com/downloads/details.aspx?FamilyID=5290EC16-138D-47FC-BED6-712F20787058Windows Server 2008 R2 for x64-based Systems Service Pack 1: http://www.microsoft.com/downloads/details.aspx?FamilyID=0025149F-11E3-4357-86E6-F80A614D7D4BWindows 8 for 32-bit Systems: http://www.microsoft.com/downloads/details.aspx?FamilyID=7C472B63-8FF7-41D3-80C5-1EAD2FBE6CF8Windows 8 for x64-based Systems: http://www.microsoft.com/downloads/details.aspx?FamilyID=2F29199E-F501-408E-A4AB-DF1A76D9209BWindows Server 2012: http://www.microsoft.com/downloads/details.aspx?FamilyID=7C1677F4-302C-48E7-946E-5EFA85AAF541-- Internet Explorer 11 --Windows 7 for 32-bit Systems Service Pack 1: http://www.microsoft.com/downloads/details.aspx?FamilyID=1456B7A4-562A-46A6-9066-2CE4ED6C5997Windows 7 for x64-based Systems Service Pack 1: http://www.microsoft.com/downloads/details.aspx?FamilyID=9C05A806-8196-4802-A488-8246584FE991Windows Server 2008 R2 for x64-based Systems Service Pack 1: http://www.microsoft.com/downloads/details.aspx?FamilyID=CA7D68CA-F581-4CD8-A527-C2FA3705DF9EWindows 8.1 for 32-bit Systems: http://www.microsoft.com/downloads/details.aspx?FamilyID=3DA76284-EF1B-45CF-9535-4DF98567B7C4Windows 8.1 for x64-based Systems: http://www.microsoft.com/downloads/details.aspx?FamilyID=1C00E8DB-21B0-4A51-87A9-ABE585D3B042Windows Server 2012 R2: http://www.microsoft.com/downloads/details.aspx?FamilyID=6D837081-BC37-4218-9EED-5432667C69E6Note: Security updates for Windows RT and Windows RT 8.1 are available via Windows Update only.
     
CVE   CVE-2014-6353
CVE-2014-6351
CVE-2014-6350
CVE-2014-6349
CVE-2014-6348
CVE-2014-6347
CVE-2014-6346
CVE-2014-6345
CVE-2014-6344
CVE-2014-6343
CVE-2014-6342
CVE-2014-6341
CVE-2014-6340
CVE-2014-6339
CVE-2014-6337
CVE-2014-6323
CVE-2014-4143
     
References   Microsoft (KB3003057):
https://technet.microsoft.com/library/security/MS14-065
ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-14-374/
http://www.zerodayinitiative.com/advisories/ZDI-14-375/
http://www.zerodayinitiative.com/advisories/ZDI-14-376/
http://www.zerodayinitiative.com/advisories/ZDI-14-377/
http://www.zerodayinitiative.com/advisories/ZDI-14-378/
http://www.zerodayinitiative.com/advisories/ZDI-14-379/
http://www.zerodayinitiative.com/advisories/ZDI-14-380/
http://www.zerodayinitiative.com/advisories/ZDI-14-381/
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Web 2.0 : Internet Explorer information disclosure vulnerability (CVE-2014-6340)
5.0.0
Web 2.0 : Detection of visual basic script embedded in web page
5.0.0
Web 2.0 : Internet Explorer memory corruption vulnerability (CVE-2014-6337)
6.0.0
Web 2.0 : Internet Explorer memory corruption vulnerability (CVE-2014-6339)
6.0.0
Web 2.0 : Internet Explorer memory corruption vulnerability (CVE-2014-6353)
6.0.0
Web 2.0 : Internet Explorer memory corruption vulnerability (CVE-2014-6347)
6.0.0
Web 2.0 : Internet Explorer memory corruption vulnerability (CVE-2014-6351)
6.0.0
Web 2.0 : Internet Explorer memory corruption vulnerability (CVE-2014-6341)
6.0.0
Web 2.0 : Internet Explorer memory corruption vulnerability (CVE-2014-6347)
6.0.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2014-11-11 

 Target Type 
Client 

 Possible exploit 
Remote