Vulnerability Details : CVE-2014-6332
Public exploit exists!
OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted web site, as demonstrated by an array-redimensioning attempt that triggers improper handling of a size value in the SafeArrayDimen function, aka "Windows OLE Automation Array Remote Code Execution Vulnerability."
Vulnerability category: Execute code
Products affected by CVE-2014-6332
- cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
- cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
CVE-2014-6332 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Microsoft Windows Object Linking & Embedding (OLE) Automation Array Remote Code Execution Vulnerabil
CISA required action:
Apply updates per vendor instructions.
CISA description:
OleAut32.dll in OLE in Microsoft Windows allows remote attackers to remotely execute code via a crafted web site.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2014-6332
Added on
2022-03-25
Action due date
2022-04-15
Exploit prediction scoring system (EPSS) score for CVE-2014-6332
95.64%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2014-6332
-
MS14-064 Microsoft Internet Explorer Windows OLE Automation Array Remote Code Execution
Disclosure Date: 2014-11-13First seen: 2020-04-26exploit/windows/browser/ms14_064_ole_code_executionThis module exploits the Windows OLE Automation array vulnerability, CVE-2014-6332. The vulnerability is known to affect Internet Explorer 3.0 until version 11 within Windows 95 up to Windows 10, and no patch for Windows XP. However, this exploit will only target Win
CVSS scores for CVE-2014-6332
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-02-10 |
CWE ids for CVE-2014-6332
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2014-6332
-
https://www.exploit-db.com/exploits/37668/
Internet Download Manager - OLE Automation Array Remote Code Execution - Windows remote ExploitExploit;Third Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/37800/
Microsoft Windows HTA (HTML Application) - Remote Code Execution (MS14-064) - Windows remote ExploitExploit;Third Party Advisory;VDB Entry
-
http://securityintelligence.com/ibm-x-force-researcher-finds-significant-vulnerability-in-microsoft-windows
IBM X-Force Researcher Finds Significant Vulnerability in Microsoft WindowsExploit;Third Party Advisory
-
http://www.us-cert.gov/ncas/alerts/TA14-318B
Microsoft Windows OLE Automation Array Remote Code Execution Vulnerability | CISAThird Party Advisory;US Government Resource
-
http://www.securitytracker.com/id/1031184
Microsoft Windows OLE Automation Array Bug Lets Remote Users Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/38512/
The World Browser 3.0 Final - Remote Code Execution - Windows remote ExploitExploit;Third Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/134053/Avant-Browser-Lite-Ultimate-Remote-Code-Execution.html
Avant Browser Lite / Ultimate Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/38500/
HTML Compiler - Remote Code Execution - Windows remote ExploitExploit;Third Party Advisory;VDB Entry
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-064
Microsoft Security Bulletin MS14-064 - Critical | Microsoft DocsPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/70952
Microsoft Windows CVE-2014-6332 OLE Remote Code Execution VulnerabilityThird Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/134061/The-World-Browser-3.0-Final-Remote-Code-Execution.html
The World Browser 3.0 Final Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://www.kb.cert.org/vuls/id/158647
VU#158647 - Microsoft Windows Object Linking and Embedding (OLE) OleAut32 library SafeArrayRedim function vulnerable to remote code execution via Internet ExplorerThird Party Advisory;US Government Resource
-
http://packetstormsecurity.com/files/134062/HTML-Compiler-Remote-Code-Execution.html
HTML Compiler Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/134064/Microsoft-Compiled-HTML-Help-Remote-Code-Execution.html
Microsoft Compiled HTML Help Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://forsec.nl/wp-content/uploads/2014/11/ms14_064_ie_olerce.rb_.txt
Exploit;Third Party Advisory
-
http://packetstormsecurity.com/files/134079/Winamp-Bento-Browser-Remote-Code-Execution.html
Winamp Bento Browser Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to