===================================================================== CERT-Renater Note d'Information No. 2014/VULN295 _____________________________________________________________________ DATE : 10/12/2014 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Windows version 7, Server 2003, Server 2008 running Microsoft VBScript Scripting Engine. ====================================================================== KB3016711 https://technet.microsoft.com/library/security/ms14-084 ______________________________________________________________________ Microsoft Security Bulletin MS14-084 - Critical Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3016711) Published: December 9, 2014 Version: 1.0 Executive Summary This security update resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Affected Software Windows Server 2003 Windows Server 2008 Windows 7 Windows Server 2008 R2 Vulnerability Information VBScript Memory Corruption Vulnerability - CVE-2014-6363 A remote code execution vulnerability exists in the way that the VBScript engine, when rendered in Internet Explorer, handles objects in memory. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit this vulnerability. ========================================================= Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================