CERT-In Vulnerability Note
CIVN-2014-0246
Multiple Remote Code Execution Vulnerabilities in Microsoft Windows OLE
Original Issue Date:November 12, 2014
Severity Rating: HIGH
Systems Affected
- Windows Server 2003 SP2
- Windows Server 2003 x64 Edition SP2 and Itanium-based Systems sp2
- Windows Vista SP2
- Windows Vista x64 Edition SP2
- Windows Server 2008 for 32-bit,x64-based, and Itanium-based Systems SP2
- Windows 7 for 32-bit and x64-based Systems SP1
- Windows Server 2008 R2 for x64-based and Itanium-based Systems SP1
- Windows 8 and 8.1 for 32-bit and x64-based Systems
- Windows Server 2012
- Windows Server 2012 R2
- Windows RT and Windows RT 8.1
- Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
- Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
- Windows Server 2012 (Server Core installation)
- Windows Server 2012 R2 (Server Core installation)
Overview
Multiple vulnerabilities have been reported in Microsoft Windows OLE which could allow a remote attacker to run arbitrary code in the context of the logged in user.
Description
1. Memory Corruption Vulnerability in Microsoft Windows OLE
(
CVE-2014-6332
)
A memory corruption vulnerability exists in Microsoft Windows due to improper handling of objects in memory by the Internet Explorer. A remote attacker could exploit this vulnerability by enticing the targeted user to view a specially crafted website. Successful exploitation of this vulnerability could allow a remote attacker to run arbitrary code in the context of the currently logged in user and install programs, view, change, or delete data ,or create new accounts with full user rights.
2. Remote Code Execution Vulnerability in Microsoft Windows OLE
(
CVE-2014-6352
)
A Remote Code Execution vulnerability exists in Object Linking and Embedding (OLE) component of Microsoft Windows due to improper handling of objects within other Microsoft Office files. A remote attacker could exploit this vulnerability by enticing the user to open a specially crafted Microsoft Office file that contain a malicious OLE object. Successful exploitation of this vulnerability could allow a remote attacker to run arbitrary code in the context of the logged in user and install programs, view, change, or delete data, or create new accounts .
Workaround
- Apply the Microsoft Fix it solution, "OLE packager Shim Workaround", that prevents exploitation of the vulnerability.
- Do not open Microsoft PowerPoint files, or other files, from untrusted sources.
- Enable User Account Control (UAC).
- Deploy the Enhanced Mitigation Experience Toolkit 5.0 and configure Attack Surface Reduction.
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS14-064
Vendor Information
Microsoft
https://technet.microsoft.com/en-us/library/security/ms14-064.aspx
References
Microsoft
https://technet.microsoft.com/en-us/library/security/ms14-064.aspx
Security Tracker
http://www.securitytracker.com/id/1031184
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=36286
http://tools.cisco.com/security/center/viewAlert.x?alertId=36160
CVE Name
CVE-2014-6332
CVE-2014-6352
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|