First published: Wed Feb 12 2014(Updated: )
The XMLHTTP ActiveX controls in XML Core Services 3.0 in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to bypass the Same Origin Policy via a web page that is visited in Internet Explorer, aka "MSXML Information Disclosure Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Vista | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0266 has been classified with a severity level that indicates a critical vulnerability allowing remote code execution.
To fix CVE-2014-0266, ensure that you have installed the latest security updates provided by Microsoft for affected Windows versions.
CVE-2014-0266 affects various Windows operating systems including Windows XP, Vista, 7, 8, 8.1, and Windows Server editions.
Yes, CVE-2014-0266 can be exploited remotely by attackers to execute arbitrary code on a vulnerable system.
The impact of CVE-2014-0266 on your system may include unauthorized access, data loss, or complete control by an attacker.