ADVISORY: Microsoft Internet Explorer vulnerability (CVE-2014-1776)

Tuesday, April 29, 2014

The information below was sent to the U-M IT Security Community April 29, 2014.

Summary

A vulnerability in Microsoft Internet Explorer could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.

Problem

Microsoft Internet Explorer contains a use-after-free vulnerability. This can allow for arbitrary code execution.

Threats

 Exploit code is publicly available with limited, targeted attacks.

Affected Systems

Internet Explorer versions 6 through 11 are affected.

Detection

None identified.

Action Items

Patch affected systems as patches are made available. IIA is continuing to monitor reporting on this vulnerability. In the meantime, the use of alternate browsers is recommended. Some U-M systems require Internet Explorer for full functionality. It is recommended that members of the U-M community use only use Internet Explorer when necessary to access these trusted U-M systems.

Technical Details

The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website.

Information for Users

Please advise users that the use of alternate browsers is recommended. Some U-M systems (such as M-Pathways) require Internet Explorer for full functionality. Users can use IE for access to these trusted U-M systems if necessary. You can refer users to this page on Safe Computing for details: 
http://www.safecomputing.umich.edu/Alerts/04.29.2014IE.php 
Thank you for helping to field any questions you get.

Questions, Concerns, Reports

 Please contact [email protected].