Skip to main content

VBScript Scripting Engine Remote Code Execution Vulnerability

Last Update Date: 16 Dec 2014 Release Date: 10 Dec 2014 3202 Views

RISK: High Risk

TYPE: Clients - Productivity Products

TYPE: Productivity Products

A remote code execution vulnerability exists in the way that the VBScript engine, when rendered in Internet Explorer, handles objects in memory. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit this vulnerability.

An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The update addresses the vulnerability by modifying how the VBScript scripting engine handles objects in memory.


Impact

  • Remote Code Execution

System / Technologies affected

  • VBScript 5.6 (Internet Explorer 6)
  • VBScript 5.7 (Internet Explorer 7)
  • VBScript 5.8 (Internet Explorer 8)

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link