ID CVE-2014-0322
Summary Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014.
References
Vulnerable Configurations
  • Microsoft Internet Explorer 9
    cpe:2.3:a:microsoft:internet_explorer:9
  • Microsoft Internet Explorer 10
    cpe:2.3:a:microsoft:internet_explorer:10
CVSS
Base: 9.3 (as of 02-09-2016 - 17:42)
Impact:
Exploitability:
CWE CWE-416
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
  • description MS14-012 Microsoft Internet Explorer CMarkup Use-After-Free. CVE-2014-0322. Remote exploit for windows platform
    file exploits/windows/remote/32904.rb
    id EDB-ID:32904
    last seen 2016-02-03
    modified 2014-04-16
    platform windows
    port
    published 2014-04-16
    reporter metasploit
    source https://www.exploit-db.com/download/32904/
    title Microsoft Internet Explorer - CMarkup Use-After-Free MS14-012
    type remote
  • description Microsoft Internet Explorer 10 - CMarkup Use-After-Free (MS14-012). CVE-2014-0322. Remote exploit for windows platform
    file exploits/windows/remote/32851.html
    id EDB-ID:32851
    last seen 2016-02-03
    modified 2014-04-14
    platform windows
    port
    published 2014-04-14
    reporter Jean-Jamil Khalife
    source https://www.exploit-db.com/download/32851/
    title Microsoft Internet Explorer 10 - CMarkup Use-After-Free MS14-012
    type remote
metasploit via4
description This module exploits an use after free condition on Internet Explorer as used in the wild as part of "Operation SnowMan" in February 2014. The module uses Flash Player 12 in order to bypass ASLR and DEP.
id MSF:EXPLOIT/WINDOWS/BROWSER/MS14_012_CMARKUP_UAF
last seen 2019-03-27
modified 2017-07-24
published 2014-04-15
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ms14_012_cmarkup_uaf.rb
title MS14-012 Microsoft Internet Explorer CMarkup Use-After-Free
msbulletin via4
bulletin_id MS14-012
bulletin_url
date 2014-03-11T00:00:00
impact Remote Code Execution
knowledgebase_id 2925418
knowledgebase_url
severity Critical
title Cumulative Security Update for Internet Explorer
nessus via4
  • NASL family Windows
    NASL id SMB_KB2934088.NASL
    description The remote host is missing one of the workarounds referenced in KB 2934088. The remote Internet Explorer install is affected by a use after free vulnerability in the MSHTML CMarkup component. By exploiting this flaw, a remote, unauthenticated attacker could execute arbitrary code on the remote host subject to the privileges of the user running the affected application.
    last seen 2017-10-29
    modified 2017-08-30
    plugin id 72605
    published 2014-02-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=72605
    title MS KB2934088: Vulnerability in Internet Explorer Could Allow Remote Code Execution
  • NASL family Windows : Microsoft Bulletins
    NASL id SMB_NT_MS14-012.NASL
    description The remote host is missing Internet Explorer (IE) Security Update 2925418. The installed version of IE is affected by multiple privilege escalation and memory corruption vulnerabilities that could allow an attacker to execute arbitrary code on the remote host. Additionally, the installed version of IE is affected by an information disclosure vulnerability.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 72930
    published 2014-03-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=72930
    title MS14-012: Cumulative Security Update for Internet Explorer (2925418)
packetstorm via4
refmap via4
cert-vn VU#732479
confirm http://technet.microsoft.com/security/advisory/2934088
exploit-db
  • 32851
  • 32904
misc
ms MS14-012
osvdb 103354
saint via4
bid 65551
description Internet Explorer CMarkup Object Handling Use-after-free Vulnerability
id win_patch_ie_v9,win_patch_ie_v10
osvdb 103354
title ie_cmarkup_uaf
type client
the hacker news via4
id THN:94A6EEF7B58D5DE9CCE68307A6FA2B6F
last seen 2018-01-27
modified 2014-02-15
published 2014-02-14
reporter Sudhir K Bansal
source https://thehackernews.com/2014/02/cve-2014-0322-internet-explorer-zero.html
title CVE-2014-0322: Internet Explorer zero-day exploit targets US Military Intelligence
Last major update 02-09-2016 - 21:34
Published 14-02-2014 - 11:55
Last modified 12-10-2018 - 18:05
Back to Top