CVE-2014-1776

9.8 CRITICAL CISA KEV - Actively Exploited
Published: April 27, 2014 Modified: October 22, 2025

Description

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this issue originally emphasized VGX.DLL, but Microsoft clarified that "VGX.DLL does not contain the vulnerable code leveraged in this exploit. Disabling VGX.DLL is an exploit-specific workaround that provides an immediate, effective workaround to help block known attacks."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/57908
Source: secure@microsoft.com
Broken Link
http://securitytracker.com/id?1030154
Source: secure@microsoft.com
Broken Link Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/222929
Source: secure@microsoft.com
Mitigation Third Party Advisory US Government Resource
http://www.osvdb.org/106311
Source: secure@microsoft.com
Broken Link
http://www.securityfocus.com/bid/67075
Source: secure@microsoft.com
Broken Link Third Party Advisory VDB Entry
http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/
Source: secure@microsoft.com
Exploit Third Party Advisory
https://technet.microsoft.com/library/security/2963983
Source: secure@microsoft.com
Mitigation Patch Vendor Advisory
http://secunia.com/advisories/57908
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://securitytracker.com/id?1030154
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/222929
Source: af854a3a-2127-422b-91ae-364da2661108
Mitigation Third Party Advisory US Government Resource
http://www.osvdb.org/106311
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/67075
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.signalsec.com/cve-2014-1776-ie-0day-analysis/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-021
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://technet.microsoft.com/library/security/2963983
Source: af854a3a-2127-422b-91ae-364da2661108
Mitigation Patch Vendor Advisory

23 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
78.5%
99th percentile
Exploitation Status
Actively Exploited
Remediation due: 2022-07-28

Weaknesses (CWE)

Affected Vendors

microsoft