First published: Sun Apr 27 2014(Updated: )
Multiple use-after-free vulnerabilities in Microsoft Internet Explorer 6 through 11 allow remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by Sebastian Apelt and Andreas Schmidt during a Pwn2Own competition at CanSecWest 2014.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =6 | |
Internet Explorer | =7 | |
Internet Explorer | =8 | |
Internet Explorer | =9 | |
Internet Explorer | =10 | |
Internet Explorer | =11 | |
=6 | ||
=7 | ||
=8 | ||
=9 | ||
=10 | ||
=11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1765 has a critical severity rating as it allows remote attackers to execute arbitrary code.
CVE-2014-1765 affects Microsoft Internet Explorer versions 6 through 11.
To mitigate CVE-2014-1765, users should upgrade to the latest version of Internet Explorer or apply any available security patches.
CVE-2014-1765 is a use-after-free vulnerability that can lead to code execution.
Yes, CVE-2014-1765 can be exploited remotely by attackers through web content.