Vulnerability – Microsoft Internet Explorer – IE Memory Corruption Vulnerability – CVE-2014-6351

Understanding and protecting against the vulnerability

defined in CVE-2014-6351

Internet Explorer Memory Corruption Vulnerability

The Original release date for the IE Memory Corruption Vulnerability – CVE-2014-6351 was 2014-11-11, the information was last updated by US-CERT/NIST on 2014-11-12 and the information on this page was updated by SAVANTURE on 2014-12-03.

In summary, this vulnerability impacts Microsoft Internet Explorer versions 8 – 11, the common browser used by most PCs by default. When a user connects to a website with code design to exploit this vulnerability, the browser allows:

      • – remote attackers to execute arbitrary code or
      • – cause a denial of service (memory corruption)

These sites are typically custom designed and obfuscated in order to have people connect to them for some legitimate reason or individuals are enticed to visit them through phishing. A PC must connect to a site with the exploit code in order to be infected. Remember, a legitimate site could be compromised and be running this code as well. Once a user connects to the site, they will be unaware of the exploit and the exploit code does not need to have authentication credentials on the website to compromise the PC.



Because the exploit allows for unauthorized access to information on the PC, allows the exploit to make modifications to the PC, and could result in a denial of service (DOS) attach, on SAVANTURE’s Vulnerability Scan Reports, this vulnerability is provided with a Score of High.
Other References: CVSS v2 Base Score: 9.3, Impact Subscore: 10.0, Exploitability Subscore: 8.6


Correcting this Vulnerability

The best way to correct this vulnerability is by updating your browser with the latest patch releases from Microsoft. Other ways are applying URL filtering and Blacklisting, however given the frequency that websites are detected with the exploit, this will not be effective. Please update your PC with Microsoft patches immediately.


Other References

By selecting these links, you will be leaving SAVANTURE’s website. At the time of publication, we had no concern with the websites which you are being referred.


External Source: Microsoft


External Source: NIST