The following cyber advisory was issued by the New York State Office of Information Technology Services and is intended for State government entities. The information may or may not be applicable to the general public and, accordingly, the State does not warrant its use for any specific purposes.

ITS ADVISORY NUMBER:
2014-056

DATE(S) ISSUED:
6/10/2014

SUBJECT:
Cumulative Security Update for Internet Explorer (MS14-035)

OVERVIEW:

Multiple vulnerabilities have been discovered in Microsoft's web browser, Internet Explorer. Successful exploitation can occur when a user visits a specially crafted website.  An attacker who successfully exploits some of these vulnerabilities could gain the same user rights as the current user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

SYSTEMS AFFECTED:

  • Internet Explorer 11
  • Internet Explorer 10
  • Internet Explorer 9
  • Internet Explorer 8
  • Internet Explorer 7
  • Internet Explorer 6

RISK:
Government:

  • Large and medium government entities: High
  • Small government entities: High

Businesses:

  • Large and medium business entities: High
  • Small business entities: High

Home users: High

DESCRIPTION:
Multiple vulnerabilities have been discovered in Microsoft's web browser, Internet Explorer, which could result in remote code execution. There are 53 vulnerabilities when Internet Explorer improperly accesses objects in memory that could allow remote code execution. Three elevation of privilege vulnerabilities exists due to Internet Explorer not properly validating permissions under certain conditions. Two information disclosure vulnerabilities one which allows an attacker to read content of local files and the other which could allow an attacker to decrypt portions of encrypted traffic.  Successful exploitation can occur when a user visits a specially crafted website.  An attacker who successfully exploits some of these vulnerabilities could gain the same user rights as the current user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

RECOMMENDATIONS:
We recommend the following actions be taken:

  • Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing.
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.

REFERENCES:
Microsoft:
https://technet.microsoft.com/en-us/security/bulletin/ms14-035

CVE:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0282
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1762
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1764
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1766
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1769
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1770
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1771
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1772
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1773
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1774
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1775
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1777
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1778
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1779
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1780
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1781
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1782
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1783
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1784
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1785
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1786
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1788
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1789
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1790
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1791
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1792
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1794
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1795
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1796
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1797
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1799
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1800
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1802
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1803
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1804
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1805
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2753
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2754
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2755
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2756
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2757
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2758
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2759
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2760
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2761
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2763
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2764
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2765
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2766
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2767
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2768
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2769
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2770
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2771
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2772
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2773
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2775
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2776
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2777

Deborah A. Snyder

Acting Chief Information Security Officer


 

Cyber Security

GIS