Microsoft Internet Explorer 9/10 JavaScript CMarkup onpropertychange resource management
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.4 | $0-$5k | 0.00 |
Summary
A vulnerability classified as very critical was found in Microsoft Internet Explorer 9/10. Affected by this vulnerability is the function onpropertychange of the component JavaScript CMarkup. Such manipulation leads to resource management.
This vulnerability is referenced as CVE-2014-0322. It is possible to launch the attack remotely. Furthermore, an exploit is available. This vulnerability has a historic impact due to its background and reception.
A worm is actively spreading and exploiting this vulnerability automatically.
Upgrading the affected component is advised.
Details
A vulnerability was found in Microsoft Internet Explorer 9/10 (Web Browser). It has been rated as very critical. Affected by this issue is the function onpropertychange of the component JavaScript CMarkup. The manipulation with an unknown input leads to a resource management vulnerability. Using CWE to declare the problem leads to CWE-399. Impacted is confidentiality, integrity, and availability. CVE summarizes:
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014.
The bug was discovered 01/20/2014. The weakness was published 02/13/2014 by Alex Watson and Victor Chin with Websense Security Labs as MSIE 0-day Exploit CVE-2014-0322 - Possibly Targeting French Aerospace Association as confirmed posting (Blog). The advisory is shared for download at community.websense.com. This vulnerability is handled as CVE-2014-0322 since 12/03/2013. The attack may be launched remotely. No form of authentication is required for exploitation. Successful exploitation requires user interaction by the victim. Technical details as well as a public exploit are known. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 01/10/2025). It is expected to see the exploit prices for this product decreasing in the near future.This vulnerability has a historic impact due to its background and reception.
A public exploit has been developed by Metasploit and been published before and not just after the advisory. The exploit is available at securityfocus.com. It is declared as attacked. The vulnerability was handled as a non-public zero-day exploit for at least 1038 days. During that time the estimated underground price was around $25k-$100k. A worm is spreading, which is automatically exploiting this vulnerability. The vulnerability scanner Nessus provides a plugin with the ID 72605 (MS KB2934088: Vulnerability in Internet Explorer Could Allow Remote Code Execution), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Windows. The commercial vulnerability scanner Qualys is able to test this issue with plugin 100180 (Microsoft Internet Explorer Multiple Remote Code Execution Vulnerabilities (MS14-012)). The advisory illustrates:
As of January 28, 2014 gifts.assso.net resolved to 173.252.252.204. This IP address is geolocated to Santa Clara, Calif. We noticed the SHA1 for Tope.swf being uploaded to VirusTotal on January 20 (the same day as the fake gifas.assso.net site was set up), with no detection at the time by AV vendors. Presumably this was done by the attackers to check AV coverage for their malware before starting their attacks, further indicating that January 20 was the initial rollout of this campaign of attacks using this 0-day. As is in the HTTP stream shown below, visitors going to hxxp://gifts.assso.net are linked to include.html, which sets up the ROP exploit and "Tope.swf" Shockwave Flash file (SHA1: 910de05e0113c167ba3878f73c64d55e5a2aff9a) which is utilized after the CVE-2014-0322 use after free vulnerability to access memory through ActionScript in the SWF file. (…) The exploit may use an in-memory attack with no file writes to avoid detection from antivirus products.This issue was added on 05/04/2022 to the CISA Known Exploited Vulnerabilities Catalog with a due date of 05/25/2022:
Apply updates per vendor instructions.Upgrading to version 11 eliminates this vulnerability. Applying the patch Fix It 51007/51008 is able to eliminate this problem. The bugfix is ready for download at blogs.technet.com. The best possible mitigation is suggested to be upgrading to the latest version. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 13598.
The vulnerability is also documented in the databases at X-Force (91101), Exploit-DB (32904), Zero-Day.cz (103), Tenable (72605) and SecurityFocus (BID 65551†). fireeye.com is providing further details. Similar entries are available at VDB-12531, VDB-12532, VDB-12533 and VDB-12534. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
Version
License
Support
Website
- Vendor: https://www.microsoft.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.6VulDB Meta Temp Score: 7.4
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 8.8
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource managementCWE: CWE-399 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Attacked
Author: Metasploit
Wormified: 🔍
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
KEV Added: 🔍
KEV Due: 🔍
KEV Remediation: 🔍
KEV Ransomware: 🔍
KEV Notice: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 72605
Nessus Name: MS KB2934088: Vulnerability in Internet Explorer Could Allow Remote Code Execution
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Saint ID: exploit_info/ie_cmarkup_uaf
Saint Name: Internet Explorer CMarkup Object Handling Use-after-free Vulnerability
Qualys ID: 🔍
Qualys Name: 🔍
MetaSploit ID: ms14_012_cmarkup_uaf.rb
MetaSploit Name: MS14-012 Microsoft Internet Explorer CMarkup Use-After-Free
MetaSploit File: 🔍
Exploit-DB: 🔍
Zero-Day.cz: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Internet Explorer 11
Patch: Fix It 51007/51008
Suricata ID: 2018147
Suricata Class: 🔍
Suricata Message: 🔍
TippingPoint: 🔍
McAfee IPS: 🔍
McAfee IPS Version: 🔍
ISS Proventia IPS: 🔍
PaloAlto IPS: 🔍
Fortigate IPS: 🔍
Timeline
04/12/2011 🔍12/03/2013 🔍
01/20/2014 🔍
01/20/2014 🔍
02/13/2014 🔍
02/13/2014 🔍
02/13/2014 🔍
02/14/2014 🔍
02/16/2014 🔍
02/18/2014 🔍
02/20/2014 🔍
04/16/2014 🔍
01/10/2025 🔍
Sources
Vendor: microsoft.comAdvisory: MSIE 0-day Exploit CVE-2014-0322 - Possibly Targeting French Aerospace Association
Researcher: Alex Watson, Victor Chin
Organization: Websense Security Labs
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2014-0322 (🔍)
GCVE (CVE): GCVE-0-2014-0322
GCVE (VulDB): GCVE-100-12320
OVAL: 🔍
IAVM: 🔍
CERT: 🔍
X-Force: 91101 - Microsoft Internet Explorer GIFAS code execution, High Risk
SecurityFocus: 65551 - Microsoft Internet Explorer CVE-2014-0322 Use-After-Free Remote Code Execution Vulnerability
Secunia: 56974
OSVDB: 103354
Vulnerability Center: 43252 - [MS14-012] Microsoft Internet Explorer 9 - 10 Remote Code Execution Vulnerability (CVE-2014-0322), Critical
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
See also: 🔍
Entry
Created: 02/18/2014 08:40Updated: 01/10/2025 15:20
Changes: 02/18/2014 08:40 (106), 04/07/2017 12:04 (12), 06/09/2021 14:51 (3), 04/25/2024 19:27 (28), 07/02/2024 22:28 (12), 07/12/2024 12:29 (2), 09/09/2024 22:30 (1), 01/10/2025 15:20 (1)
Complete: 🔍
Cache ID: 216:692:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.