Understanding and protecting against the vulnerability


defined in CVE-2014-6351


Internet Explorer Memory Corruption Vulnerability



The Original release date for this vulnerability was 2014-11-11, the information was last updated by US-CERT/NIST on 2014-11-12 and the information on this page was updated by SAVANTURE on 2014-12-03.

In summary, this vulnerability impacts Microsoft Internet Explorer versions 8 – 11, the common browser used by most PCs by default.  When a user connects to a website with code design to exploit this vulnerability, the browser allows:

      • – remote attackers to execute arbitrary code or
      • – cause a denial of service (memory corruption)

These sites are typically custom designed and obfuscated in order to have people connect to them for some legitimate reason or individuals are enticed to visit them through phishing.  A PC must connect to a site with the exploit code in order to be infected.  Remember, a legitimate site could be compromised and be running this code as well.  Once a user connects to the site, they will be unaware of the exploit and the exploit code does not need to have authentication credentials on the website to compromise the PC.

Impact Type: Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service



Because the exploit allows for unauthorized access to information on the PC, allows the exploit to make modifications to the PC, and could result in a denial of service (DOS) attach, on SAVANTURE’s Vulnerability Scan Reports, this vulnerability is provided with a Score of High
Other References: CVSS v2 Base Score: 9.3, Impact Subscore: 10.0, Exploitability Subscore: 8.6


Correcting this Vulnerability

The best way to correct this vulnerability is by updating your browser with the latest patch releases from Microsoft.  Other ways are applying URL filtering and Blacklisting, however given the frequency that websites are detected with the exploit, this will not be effective.  Please update your PC with Microsoft patches immediately.


References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving SAVANTURE’s website.  At the time of publication, we had no concern with the websites which you are being referred.

External Source: Microsoft
Type: Advisory; Patch Information