2014-11-11 This security update resolves seventeen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Vulnerabilities addressed in this bulletin:
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. The update addresses the vulnerabilities by modifying the way that Internet Explorer handles objects in memory.
CVE-2014-4143
Internet Explorer Clipboard Information Disclosure Vulnerability
An information disclosure vulnerability exists when Internet Explorer does not properly restrict access to the clipboard of a user who visits a website. The vulnerability could allow data stored on the Windows clipboard to be accessed by a malicious site. An attacker could collect information from the clipboard of a user if that user visits the malicious site. The update addresses the vulnerability by helping to prevent information stored on a user’s clipboard from being accessed by a malicious site.
CVE-2014-6323
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2014-6337
Internet Explorer ASLR Bypass Vulnerability
A security feature bypass vulnerability exists when Internet Explorer does not use the Address Space Layout Randomization (ASLR) security feature, which could allow an attacker to more reliably predict the memory offsets of specific instructions in a given call stack. The update addresses the vulnerability by helping to ensure that affected versions of Internet Explorer properly implement the ASLR security feature.
CVE-2014-6339
Internet Explorer Cross-domain Information Disclosure Vulnerability
Information disclosure vulnerabilities exist when Internet Explorer does not properly enforce cross-domain policies, which could allow an attacker to gain access to information in another domain or Internet Explorer zone. The update addresses the vulnerabilities by helping to ensure cross-domain policies are properly enforced in Internet Explorer.
CVE-2014-6340
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2014-6341
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2014-6342
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2014-6343
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2014-6344
Internet Explorer Cross-domain Information Disclosure Vulnerability
Information disclosure vulnerabilities exist when Internet Explorer does not properly enforce cross-domain policies, which could allow an attacker to gain access to information in another domain or Internet Explorer zone. The update addresses the vulnerabilities by helping to ensure cross-domain policies are properly enforced in Internet Explorer.
CVE-2014-6345
Internet Explorer Cross-domain Information Disclosure Vulnerability
Information disclosure vulnerabilities exist when Internet Explorer does not properly enforce cross-domain policies, which could allow an attacker to gain access to information in another domain or Internet Explorer zone. The update addresses the vulnerabilities by helping to ensure cross-domain policies are properly enforced in Internet Explorer.
CVE-2014-6346
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2014-6347
Internet Explorer ASLR Bypass Vulnerability
A security feature bypass vulnerability exists in Internet Explorer that could allow an attacker to bypass the Address Space Layout Randomization (ASLR) security feature, which helps protect users from a broad class of vulnerabilities. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, that could take advantage of the ASLR bypass to run arbitrary code.
CVE-2014-6348
Internet Explorer Elevation of Privilege Vulnerability
Elevation of privilege vulnerabilities exist when Internet Explorer does not properly validate permissions under specific conditions, potentially allowing script to be run with elevated privileges. The update addresses the vulnerabilities by adding additional permission validations to Internet Explorer.
CVE-2014-6349
Internet Explorer Elevation of Privilege Vulnerability
Elevation of privilege vulnerabilities exist when Internet Explorer does not properly validate permissions under specific conditions, potentially allowing script to be run with elevated privileges. The update addresses the vulnerabilities by adding additional permission validations to Internet Explorer.
CVE-2014-6350
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2014-6351
Internet Explorer Memory Corruption Vulnerability
Remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
CVE-2014-6353

Bulletin details at Microsoft.com

Related CVE Entries

Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-6341.
Max CVSS
9.3
EPSS Score
22.14%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 7 through 11 allows remote attackers to obtain sensitive clipboard information via a crafted web site, aka "Internet Explorer Clipboard Information Disclosure Vulnerability."
Max CVSS
4.3
EPSS Score
22.18%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
54.39%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 8 and 9 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability."
Max CVSS
5.0
EPSS Score
1.33%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 6 through 11 allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site, aka "Internet Explorer Cross-domain Information Disclosure Vulnerability."
Max CVSS
4.3
EPSS Score
22.18%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4143.
Max CVSS
9.3
EPSS Score
48.06%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-6348.
Max CVSS
9.3
EPSS Score
48.06%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
48.06%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
48.06%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 9 and 10 allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site, aka "Internet Explorer Cross-domain Information Disclosure Vulnerability."
Max CVSS
4.3
EPSS Score
22.18%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 8 through 11 allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site, aka "Internet Explorer Cross-domain Information Disclosure Vulnerability."
Max CVSS
4.3
EPSS Score
22.18%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
48.06%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-6342.
Max CVSS
9.3
EPSS Score
62.63%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 10 and 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2014-6350.
Max CVSS
4.3
EPSS Score
0.33%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 10 and 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2014-6349.
Max CVSS
4.3
EPSS Score
0.28%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
62.63%
Published
2014-11-11
Updated
2018-10-12
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Max CVSS
9.3
EPSS Score
54.39%
Published
2014-11-11
Updated
2018-10-12
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!