CISA KEV 정보
| 취약점명 | Microsoft Windows Object Linking & Embedding (OLE) Remote Code Execution Vulnerability |
|---|---|
| 설명 | A vulnerability exists in Windows Object Linking & Embedding (OLE) that could allow remote code execution if a user opens a file that contains a specially crafted OLE object. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-20 |
| 등록일 (KEV) | 2022-03-03 |
| 조치 기한 | 2022-03-24 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2014-4114 |
NVD 상세 정보
CVSS v3.1: 7.8 HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HCVSS v2.0: 9.3
AV:N/AC:M/Au:N/C:C/I:C/A:C설명: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability."
참조
- http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-windows-zero-day-vulnerability-cve-2014-4114-aka-sandworm/ [Exploit]
- http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx [Broken Link, Vendor Advisory]
- http://osvdb.org/show/osvdb/113140 [Broken Link]
- http://secunia.com/advisories/60972 [Broken Link]
- http://www.exploit-db.com/exploits/35019 [Exploit, Third Party Advisory, VDB Entry]
- http://www.exploit-db.com/exploits/35020 [Exploit, Third Party Advisory, VDB Entry]
- http://www.exploit-db.com/exploits/35055 [Exploit, Third Party Advisory, VDB Entry]
- http://www.isightpartners.com/2014/10/cve-2014-4114/ [Broken Link]
- http://www.securityfocus.com/bid/70419 [Broken Link, Third Party Advisory, VDB Entry]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-060 [Patch, Vendor Advisory]
- http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-windows-zero-day-vulnerability-cve-2014-4114-aka-sandworm/ [Exploit]
- http://blogs.technet.com/b/srd/archive/2014/10/14/accessing-risk-for-the-october-2014-security-updates.aspx [Broken Link, Vendor Advisory]
- http://osvdb.org/show/osvdb/113140 [Broken Link]
- http://secunia.com/advisories/60972 [Broken Link]
- http://www.exploit-db.com/exploits/35019 [Exploit, Third Party Advisory, VDB Entry]
- ... 외 6건
This product uses the NVD API but is not endorsed or certified by the NVD.