A Killer Combo: Critical Vulnerability and ‘Godmode’ Exploitation on CVE-2014-6332

JMH

Emeritus, Contributor
Joined
Apr 2, 2012
Posts
7,197
Microsoft released 16 security updates during its Patch Tuesday release for November 2014, among which includes CVE-2014-6332, or the Windows OLE Automation Array Remote Code Execution Vulnerability (covered in MS14-064). We would like to bring attention to this particular vulnerability for the following reasons:


  1. It impacts almost all Microsoft Windows versions from Windows 95 onward.
  2. A stable exploit exists and works in versions of Internet Explorer from 3 to 11, and can bypass operating system (OS) security utilities and protection such as Enhanced Mitigation Experience Toolkit (EMET), Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR),and Control-Flow Integrity (CFI).
  3. Proof of concept (PoC) exploit code has recently been published by a Chinese researcher named Yuange1975.
  4. Based on the PoC, it’s fairly simple to write malicious VBScript code for attacks.
  5. Attackers may soon utilize the PoC to target unpatched systems.

About the CVE-2014-6332 Vulnerability


The bug is caused by improper handling resizing an array in the Internet Explorer VBScript engine. VBScript is the default scripting language in ASP (Active Server Pages). Other browsers like Google Chrome do not support VBScript, but Internet Explorer still supports it via a legacy engine to ensure backward compatibility.
A Killer Combo: Critical Vulnerability and 'Godmode' Exploitation on CVE-2014-6332
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top