Microsoft Security Bulletin MS14-037 - Critical
Cumulative Security Update for Internet Explorer (2975687)
Published: July 8, 2014 | Updated: July 29, 2014
Version: 1.1
General Information
Executive Summary
This security update resolves one publicly disclosed vulnerability and twenty-four privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers. For more information, see the Affected and Non-Affected Software section.
The security update addresses the vulnerabilities by modifying the way that Internet Explorer handles objects in memory, validates permissions, and handles negotiation of certificates during a TLS session. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry later in this bulletin.
Recommendation. Most customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871. For customers who do not have automatic updating enabled, the steps in Turn automatic updating on or off can be used to enable automatic updating.
For enterprise installations, or administrators and end users who want to install this security update manually (including customers who have not enabled automatic updating), Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service. The updates are also available via the download links in the Affected Software table in this bulletin.
For additional guidance, see the Detection and Deployment Tools and Guidance section in this bulletin.
Knowledge Base Article
- Knowledge Base Article: 2975687
- File Information: Yes
- SHA1/SHA2 hashes: Yes
- Known issues: Yes
Affected and Non-Affected Software
The following software has been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.
Affected Software
Operating System | Component | Maximum Security Impact | Aggregate Severity Rating | Updates Replaced |
---|---|---|---|---|
**Internet Explorer 6** | ||||
Windows Server 2003 Service Pack 2 | [Internet Explorer 6](https://www.microsoft.com/download/details.aspx?familyid=70b370e8-5249-4d40-91b4-65d57963502f) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2003 x64 Edition Service Pack 2 | [Internet Explorer 6](https://www.microsoft.com/download/details.aspx?familyid=ee91e864-17c8-43e9-a5f1-e4a5eba883e2) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2003 with SP2 for Itanium-based Systems | [Internet Explorer 6](https://www.microsoft.com/download/details.aspx?familyid=a9619af6-8a6e-4dd5-8148-e886835cd246) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
**Internet Explorer 7** | ||||
Windows Server 2003 Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=bbf7f732-bcf1-4e51-8c52-bb0c43e93a49) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2003 x64 Edition Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=6fe7833d-d068-4c50-83eb-07d29ea1f674) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2003 with SP2 for Itanium-based Systems | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=c56bcaf9-2ee9-4bc7-b565-d7d183792e01) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Vista Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=ab99dd4d-7837-4c63-97be-431cf857e3fe) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Vista x64 Edition Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=1933e14e-6d2f-46c3-abe4-1c981a412e9f) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2008 for 32-bit Systems Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=cd334a79-1bb4-4f22-bd79-78c1208ad9de) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2008 for x64-based Systems Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=98070fde-573a-4531-a6f4-fde060512324) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2008 for Itanium-based Systems Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=c0707e6f-b49e-4581-b2a7-4f8ecda5805a) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
**Internet Explorer 8** | ||||
Windows Server 2003 Service Pack 2 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=340fb17a-6b6f-4f0e-9e61-1de410cc966b) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2003 x64 Edition Service Pack 2 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=85fcce53-7c70-4439-ad7e-0a30f4ada6da) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Vista Service Pack 2 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=10df0340-2d36-48d4-b415-8344b67ac2ec) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Vista x64 Edition Service Pack 2 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=735bbd88-d94e-4a7a-9a3b-ee3bbbacc6c2) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2008 for 32-bit Systems Service Pack 2 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=db803d12-906f-471e-860e-ba0ba51f7365) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2008 for x64-based Systems Service Pack 2 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=cac224b0-28e6-4433-93ad-645abcdaf94b) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 7 for 32-bit Systems Service Pack 1 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=06998b1c-3a51-4a8a-a25f-f25a50c65f4b) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 7 for x64-based Systems Service Pack 1 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=ae1d1f1c-c271-4100-b63c-93e2bab698ba) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=bf7512c5-e86c-4155-b1fa-588e6f49fc1c) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=de025f92-76f1-45be-89e6-2e6b5e3c2300) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
**Internet Explorer 9** | ||||
Windows Vista Service Pack 2 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=c89e9da7-d44f-4236-bbdc-d4c49b1210dc) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Vista x64 Edition Service Pack 2 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=68e76d04-0aa1-455f-b494-ffd336747742) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2008 for 32-bit Systems Service Pack 2 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=b31e84b9-8ba7-4363-b23e-e1de3237cfc7) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2008 for x64-based Systems Service Pack 2 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=f0aabbe0-cf72-430c-afe2-2e5abb748e1f) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 7 for 32-bit Systems Service Pack 1 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=ec5e5a27-6e72-4e6c-806e-bf8bafe1007a) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 7 for x64-based Systems Service Pack 1 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=d343035a-c05e-4c65-be8b-c324b8cacc1a) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=98a4f0c1-0ddc-4014-9e45-7bc0390d1ec1) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
**Internet Explorer 10** | ||||
Windows 7 for 32-bit Systems Service Pack 1 | [Internet Explorer 10](https://www.microsoft.com/download/details.aspx?familyid=b0863af3-4761-49ae-a0df-2f58f0073e95) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 7 for x64-based Systems Service Pack 1 | [Internet Explorer 10](https://www.microsoft.com/download/details.aspx?familyid=85b5eba3-2230-4766-ab0a-90e4875670d9) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | [Internet Explorer 10](https://www.microsoft.com/download/details.aspx?familyid=674f01eb-cf8f-4ab9-9fd1-f7a2b5ac3425) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 8 for 32-bit Systems | [Internet Explorer 10](https://www.microsoft.com/download/details.aspx?familyid=88e8c74d-42ea-4ad1-ace0-aa7adbccdb38) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 8 for x64-based Systems | [Internet Explorer 10](https://www.microsoft.com/download/details.aspx?familyid=9daedc65-8d5d-4f91-9eef-0b0389e7a5e8) (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2012 | [Internet Explorer 10](https://www.microsoft.com/download/details.aspx?familyid=be949513-08cb-41da-bdc6-0db63191b58f) (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows RT | Internet Explorer 10[1] (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
**Internet Explorer 11** | ||||
Windows 7 for 32-bit Systems Service Pack 1 | [Internet Explorer 11](https://www.microsoft.com/download/details.aspx?familyid=6d6b97c0-ccd4-439b-8e18-43d9a7456ff9)[2] (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 7 for 32-bit Systems Service Pack 1 | Internet Explorer 11[3] (2963952) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 7 for x64-based Systems Service Pack 1 | [Internet Explorer 11](https://www.microsoft.com/download/details.aspx?familyid=bbad4937-8359-4026-b40f-b807fd42f491)[2] (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 7 for x64-based Systems Service Pack 1 | Internet Explorer 11[3] (2963952) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | [Internet Explorer 11](https://www.microsoft.com/download/details.aspx?familyid=28ee8932-2dea-4178-8814-3abf6d10e719)[2] (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Internet Explorer 11[3] (2963952) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 8.1 for 32-bit Systems | [Internet Explorer 11](https://www.microsoft.com/download/details.aspx?familyid=813db738-ee06-4ebe-919e-8a292990f31b)[4] (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 8.1 for 32-bit Systems | Internet Explorer 11[5] (2963952) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 8.1 for x64-based Systems | [Internet Explorer 11](https://www.microsoft.com/download/details.aspx?familyid=06d56f02-e11f-4f9d-aa07-153841194406)[4] (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows 8.1 for x64-based Systems | Internet Explorer 11[5] (2963952) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2012 R2 | [Internet Explorer 11](https://www.microsoft.com/download/details.aspx?familyid=b7dbd31c-3fe1-455a-b6f4-84ff48a95a2c)[4] (2962872) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows Server 2012 R2 | Internet Explorer 11[5] (2963952) | Remote Code Execution | Moderate | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
Windows RT 8.1 | Internet Explorer 11[1][4] (2962872) | Remote Code Execution | Critical | 2957689 in [MS14-035](http://go.microsoft.com/fwlink/?linkid=400972) |
[2]This update is for systems that have the 2929437 update installed. See the Update FAQ for more information.
[3]This update is for systems that do not have the 2929437 update installed. This update is not available via the Microsoft Download Center. See the Update FAQ for more information.
[4]This update is for systems that have the 2919355 update installed. See the Update FAQ for more information.
[5]This update is for systems that do not have the 2919355 update installed. This update is not available via the Microsoft Download Center. See the Update FAQ for more information.
Non-Applicable Software
Operating System | Component |
---|---|
**Server Core installation** | |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Not applicable |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Not applicable |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Not applicable |
Windows Server 2012 (Server Core installation) | Not applicable |
Windows Server 2012 R2 (Server Core installation) | Not applicable |
Update FAQ
There are multiple updates listed for Internet Explorer 11. Do I need to install all the updates?
No. Depending on how your system is configured to receive updates, only one of the updates for Internet Explorer 11 may apply.
For systems running Internet Explorer 11 on Windows 7 or Windows Server 2008 R2:
- The 2962872 update is for systems that have the 2929437 update installed.
- The 2963952 update is for systems without the 2929437 update installed. Note that the 2963952 update is only available for customers managing updates using Windows Server Update Services (WSUS), Windows Intune, or System Center Configuration Manager.
For systems running Internet Explorer 11 on Windows 8.1 or Windows Server 2012 R2:
- The 2962872 update is for systems that have the 2919355 update installed.
- The 2963952 update is for systems without the 2919355 update installed. Note that the 2963952 update is only available for customers managing updates using Windows Server Update Services (WSUS), Windows Intune, or System Center Configuration Manager.
For Internet Explorer 11, are there any prerequisites for the 2962872 update?
Yes. Customers running Internet Explorer 11 on Windows 8.1, Windows Server 2012 R2, or Windows RT 8.1, must first install the 2919355 update released in April, 2014 before installing the 2962872 update. For more information about this prerequisite update, see Microsoft Knowledge Base Article 2919355.
Customers running Internet Explorer 11 on Windows 7 or Windows Server 2008 R2, must first install the 2929437 update released in April, 2014 before installing the 2962872 update. For more information about this prerequisite update, see Microsoft Knowledge Base Article 2929437.
How are Server Core installations affected by the vulnerabilities addressed in this bulletin?
The vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2 as indicated in the Non-Applicable Software table, when installed using the Server Core installation option. For more information on this installation option, see the TechNet articles, Managing a Server Core Installation: Overview, Servicing a Server Core Installation, and Server Core and Full Server Integration Overview.
I am using an older release of the software discussed in this security bulletin. What should I do?
The affected software listed in this bulletin has been tested to determine which releases are affected. Other releases are past their support life cycle. For more information about the product lifecycle, see the Microsoft Support Lifecycle website.
It should be a priority for customers who have older releases of the software to migrate to supported releases to prevent potential exposure to vulnerabilities. To determine the support lifecycle for your software release, see Select a Product for Lifecycle Information. For more information about service packs for these software releases, see Service Pack Lifecycle Support Policy.
Customers who require custom support for older software must contact their Microsoft account team representative, their Technical Account Manager, or the appropriate Microsoft partner representative for custom support options. Customers without an Alliance, Premier, or Authorized Contract can contact their local Microsoft sales office. For contact information, see the Microsoft Worldwide Information website, select the country in the Contact Information list, and then click Go to see a list of telephone numbers. When you call, ask to speak with the local Premier Support sales manager. For more information, see the Microsoft Support Lifecycle Policy FAQ.
Severity Ratings and Vulnerability Identifiers
The following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the July bulletin summary. For more information, see Microsoft Exploitability Index.
In the following table: Where specified, Critical, Important, and Moderate values indicate severity ratings. For more information, see Security Bulletin Severity Rating System. Where specified, RCE (Remote Code Execution), EoP (Elevation of Privilege), and Security Feature Bypass indicate maximum impact.
For example, Windows Clients: Critical / RCE specifies that the vulnerability is Critical severity with impact of remote code execution for the affected version of Internet Explorer running on a Windows client operating system. Windows Servers: Moderate / RCE specifies that the vulnerability is Moderate severity with impact of remote code execution for the affected version of Internet Explorer running on a Windows server operating system. Windows Clients and Servers:Moderate / Security Feature Bypass specifies that the vulnerability is Moderate severity with impact of security feature bypass for the affected version of Internet Explorer running on either a Windows client or Windows server operating system.
Severity Ratings and Impact
CVE number | Vulnerability Title | Internet Explorer 6 | Internet Explorer 7 | Internet Explorer 8 | Internet Explorer 9 | Internet Explorer 10 | Internet Explorer 11 | ||
---|---|---|---|---|---|---|---|---|---|
CVE-2014-1763 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-1765 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2783 | Extended Validation (EV) Certificate Security Feature Bypass Vulnerability | Not applicable | Windows Clients and Servers: **Moderate / Security Feature Bypass** | Windows Clients and Servers: **Moderate / Security Feature Bypass** | Windows Clients and Servers: **Moderate / Security Feature Bypass** | Windows Clients and Servers: **Moderate / Security Feature Bypass** | Windows Clients and Servers: **Moderate / Security Feature Bypass** | ||
CVE-2014-2785 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Not applicable | Not applicable | Not applicable | Not applicable | ||
CVE-2014-2786 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2787 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2788 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Not applicable | Not applicable | Not applicable | Not applicable | ||
CVE-2014-2789 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2790 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2791 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Not applicable | Not applicable | ||
**CVE NAME** | **Vulnerability Title** | **Internet Explorer 6** | **Internet Explorer 7** | **Internet Explorer 8** | **Internet Explorer 9** | **Internet Explorer 10** | **Internet Explorer 11** | ||
CVE-2014-2792 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2794 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Not applicable | Not applicable | Not applicable | Not applicable | ||
CVE-2014-2795 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2797 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Not applicable | Not applicable | Not applicable | ||
CVE-2014-2798 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2800 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2801 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2802 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2803 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Not applicable | ||
CVE-2014-2804 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
**CVE NAME** | **Vulnerability Title** | **Internet Explorer 6** | **Internet Explorer 7** | **Internet Explorer 8** | **Internet Explorer 9** | **Internet Explorer 10** | **Internet Explorer 11** | ||
CVE-2014-2806 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2807 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2809 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-2813 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** | ||
CVE-2014-4066 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: **Critical / RCE** Windows Servers: **Moderate / RCE** |
Extended Validation (EV) Certificate Security Feature Bypass Vulnerability - CVE-2014-2783
A security feature bypass vulnerability exists in Internet Explorer because Extended Validation (EV) SSL Certificate guidelines, which disallow the use of wildcard certificates, are not properly enforced. An attacker could bypass EV SSL certificate guidelines by using a wildcard certificate. EV SSL certificates issued by Certificate Authorities (CA) in compliance with Extended Validation (EV) SSL Certificate guidelines cannot be used to exploit this vulnerability.
To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, click the link in the following table:
Vulnerability title | CVE number |
Extended Validation (EV) Certificate Security Feature Bypass Vulnerability | CVE-2014-2783 |
Vulnerability title | CVE number |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-1763 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-1765 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2785 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2786 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2787 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2788 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2789 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2790 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2791 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2792 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2794 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2795 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2797 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2798 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2800 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2801 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2802 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2803 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2804 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2806 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2807 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2809 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2813 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4066 |
CVE number | Publicly Disclosed |
CVE-2014-1763 | No |
CVE-2014-1765 | No |
CVE-2014-2785 | No |
CVE-2014-2786 | No |
CVE-2014-2787 | No |
CVE-2014-2788 | No |
CVE-2014-2789 | No |
CVE-2014-2790 | No |
CVE-2014-2791 | No |
CVE-2014-2792 | No |
CVE-2014-2794 | No |
CVE-2014-2795 | No |
CVE-2014-2797 | No |
CVE-2014-2798 | No |
CVE-2014-2800 | No |
CVE-2014-2801 | No |
CVE-2014-2802 | No |
CVE-2014-2803 | No |
CVE-2014-2804 | No |
CVE-2014-2806 | No |
CVE-2014-2807 | No |
CVE-2014-2809 | No |
CVE-2014-2813 | No |
CVE-2014-4066 | No |
CVE number | Exploited |
CVE-2014-1763 | No |
CVE-2014-1765 | No |
CVE-2014-2785 | No |
CVE-2014-2786 | No |
CVE-2014-2787 | No |
CVE-2014-2788 | No |
CVE-2014-2789 | No |
CVE-2014-2790 | No |
CVE-2014-2791 | No |
CVE-2014-2792 | No |
CVE-2014-2794 | No |
CVE-2014-2795 | No |
CVE-2014-2797 | No |
CVE-2014-2798 | No |
CVE-2014-2800 | No |
CVE-2014-2801 | No |
CVE-2014-2802 | No |
CVE-2014-2803 | No |
CVE-2014-2804 | No |
CVE-2014-2806 | No |
CVE-2014-2807 | No |
CVE-2014-2809 | No |
CVE-2014-2813 | No |
CVE-2014-4066 | No |
Security update file names | For Internet Explorer 6 for all supported 32-bit editions of Windows Server 2003: WindowsServer2003-KB2962872-x86-ENU.exe |
For Internet Explorer 6 for all supported x64-based editions of Windows Server 2003: WindowsServer2003-KB2962872-x64-ENU.exe |
|
For Internet Explorer 6 for all supported Itanium-based editions of Windows Server 2003: WindowsServer2003-KB2962872-ia64-ENU.exe |
|
For Internet Explorer 7 for all supported 32-bit editions of Windows Server 2003: IE7-WindowsServer2003-KB2962872-x86-ENU.exe |
|
For Internet Explorer 7 for all supported x64-based editions of Windows Server 2003: IE7-WindowsServer2003-KB2962872-x64-ENU.exe |
|
For Internet Explorer 7 for all supported Itanium-based editions of Windows Server 2003: IE7-WindowsServer2003-KB2962872-ia64-ENU.exe |
|
For Internet Explorer 8 for all supported 32-bit editions of Windows Server 2003: IE8-WindowsServer2003-KB2962872-x86-ENU.exe |
|
For Internet Explorer 8 for all supported x64-based editions of Windows Server 2003: IE8-WindowsServer2003-KB2962872-x64-ENU.exe |
|
Installation switches | See Microsoft Knowledge Base Article 262841 |
Update log file | For Internet Explorer 6 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003: KB2962872.log |
For Internet Explorer 7 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003: KB2962872-IE7.log |
|
For Internet Explorer 8 for all supported 32-bit editions and x64-based editions of Windows Server 2003: KB2962872-IE8.log |
|
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | For Internet Explorer 6 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003: Use Add or Remove Programs item in Control Panel or the Spuninst.exe utility located in the Use the Spuninst.exe utility, located in the %Windir%\$NTUninstallKB2962872$\Spuninst folder |
For Internet Explorer 7 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003: Use Add or Remove Programs item in Control Panel or the Spuninst.exe utility located in the %Windir%\ie7updates\KB2962872-IE7\spuninst folder |
|
For Internet Explorer 8 for all supported 32-bit editions and x64-based editions of Windows Server 2003: Use Add or Remove Programs item in Control Panel or the Spuninst.exe utility located in the %Windir%\ie8updates\KB2962872-IE8\spuninst folder |
|
File information | See Microsoft Knowledge Base Article 2962872 |
Registry key verification | For Internet Explorer 6 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Windows Server 2003\SP3\KB2962872\Filelist |
For Internet Explorer 7 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Windows Server 2003\SP0\KB2962872-IE7\Filelist |
|
For Internet Explorer 8 for all supported 32-bit editions and x64-based editions of Windows Server 2003: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Windows Server 2003\SP0\KB2962872-IE8\Filelist |
Windows Vista (all editions)
Reference Table
The following table contains the security update information for this software.
Security update file names | For Internet Explorer 7 in all supported 32-bit editions of Windows Vista: Windows6.0-KB2962872-x86.msu |
For Internet Explorer 7 in all supported x64-based editions of Windows Vista: Windows6.0-KB2962872-x64.msu |
|
For Internet Explorer 8 in all supported 32-bit editions of Windows Vista: IE8-Windows6.0-KB2962872-x86.msu |
|
For Internet Explorer 8 in all supported x64-based editions of Windows Vista: IE8-Windows6.0-KB2962872-x64.msu |
|
For Internet Explorer 9 for all supported 32-bit editions of Windows Vista: IE9-Windows6.0-KB2962872-x86.msu |
|
For Internet Explorer 9 for all supported x64-based editions of Windows Vista: IE9-Windows6.0-KB2962872-x64.msu |
|
Installation switches | See Microsoft Knowledge Base Article 934307 |
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates. |
File information | See Microsoft Knowledge Base Article 2962872 |
Registry key verification | Note A registry key does not exist to validate the presence of this update. |
Security update file names | For Internet Explorer 7 in all supported 32-bit editions of Windows Server 2008: Windows6.0-KB2962872-x86.msu |
For Internet Explorer 7 in all supported x64-based editions of Windows Server 2008: Windows6.0-KB2962872-x64.msu |
|
For Internet Explorer 7 in all supported Itanium-based editions of Windows Server 2008: Windows6.0-KB2962872-ia64.msu |
|
For Internet Explorer 8 in all supported 32-bit editions of Windows Server 2008: IE8-Windows6.0-KB2962872-x86.msu |
|
For Internet Explorer 8 in all supported x64-based editions of Windows Server 2008: IE8-Windows6.0-KB2962872-x64.msu |
|
For Internet Explorer 9 for all supported 32-bit editions of Windows Server 2008: IE9-Windows6.0-KB2962872-x86.msu |
|
For Internet Explorer 9 in all supported x64-based editions of Windows Server 2008: IE9-Windows6.0-KB2962872-x64.msu |
|
Installation switches | See Microsoft Knowledge Base Article 934307 |
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates. |
File information | See Microsoft Knowledge Base Article 2962872 |
Registry key verification | Note A registry key does not exist to validate the presence of this update. |
Security update file name | For Internet Explorer 8 in all supported 32-bit editions of Windows 7: Windows6.1-KB2962872-x86.msu |
For Internet Explorer 8 in all supported x64-based editions of Windows 7: Windows6.1-KB2962872-x64.msu |
|
For Internet Explorer 9 for all supported 32-bit editions of Windows 7: IE9-Windows6.1-KB2962872-x86.msu |
|
For Internet Explorer 9 for all supported x64-based editions of Windows 7: IE9-Windows6.1-KB2962872-x64.msu |
|
For Internet Explorer 10 for Windows 7 for 32-bit Systems Service Pack 1: IE10-Windows6.1-KB2962872-x86.msu |
|
For Internet Explorer 10 for Windows 7 for x64-based Systems Service Pack 1: IE10-Windows6.1-KB2962872-x64.msu |
|
For Internet Explorer 11 for Windows 7 for 32-bit Systems Service Pack 1: IE11-Windows6.1-KB2962872-x86.msu |
|
For Internet Explorer 11 for Windows 7 for x64-based Systems Service Pack 1: IE11-Windows6.1-KB2962872-x64.msu |
|
Installation switches | See Microsoft Knowledge Base Article 934307 |
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | To uninstall an update installed by WUSA, use the /Uninstall setup switch or click Control Panel, click System and Security, and then under Windows Update, click View installed updates and select from the list of updates. |
File information | See Microsoft Knowledge Base Article 2962872 |
Registry key verification | Note A registry key does not exist to validate the presence of this update. |
Security update file name | For Internet Explorer 8 in all supported x64-based editions of Windows Server 2008 R2: Windows6.1-KB2962872-x64.msu |
For Internet Explorer 8 in all supported Itanium-based editions of Windows Server 2008 R2: Windows6.1-KB2962872-ia64.msu |
|
For Internet Explorer 9 for all supported x64-based editions of Windows Server 2008 R2: IE9-Windows6.1-KB2962872-x64.msu |
|
For Internet Explorer 10 for Windows Server 2008 R2 for x64-based Systems Service Pack 1: IE10-Windows6.1-KB2962872-x64.msu |
|
For Internet Explorer 11 for Windows Server 2008 R2 for x64-based Systems Service Pack 1: IE11-Windows6.1-KB2962872-x64.msu |
|
Installation switches | See Microsoft Knowledge Base Article 934307 |
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | To uninstall an update installed by WUSA, use the /Uninstall setup switch or click Control Panel, click System and Security, and then under Windows Update, click View installed updates and select from the list of updates. |
File information | See Microsoft Knowledge Base Article 2962872 |
Registry key verification | Note A registry key does not exist to validate the presence of this update. |
Security update file name | For Internet Explorer 10 in all supported 32-bit editions of Windows 8: Windows8-RT-KB2962872-x86.msu |
For Internet Explorer 10 in all supported x64-based editions of Windows 8: Windows8-RT-KB2962872-x64.msu |
|
For Internet Explorer 11 in all supported 32-bit editions of Windows 8.1: Windows8.1-KB2962872-x86.msu |
|
For Internet Explorer 11 in all supported x64-based editions of Windows 8.1: Windows8.1-KB2962872-x64.msu |
|
Installation switches | See Microsoft Knowledge Base Article 934307 |
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | To uninstall an update installed by WUSA, use the /Uninstall setup switch or click Control Panel, click System and Security, click Windows Update, and then under See also, click Installed updates and select from the list of updates. |
File information | See Microsoft Knowledge Base Article 2962872 |
Registry key verification | Note A registry key does not exist to validate the presence of this update. |
Security update file name | For Internet Explorer 10 in all supported editions of Windows Server 2012: Windows8-RT-KB2962872-x64.msu |
For Internet Explorer 11 in all supported editions of Windows Server 2012 R2: Windows8.1-KB2962872-x64.msu |
|
Installation switches | See Microsoft Knowledge Base Article 934307 |
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | To uninstall an update installed by WUSA, use the /Uninstall setup switch or click Control Panel, click System and Security, click Windows Update, and then under See also, click Installed updates and select from the list of updates. |
File information | See Microsoft Knowledge Base Article 2962872 |
Registry key verification | Note A registry key does not exist to validate the presence of this update. |
Deployment | This update is available via Windows Update. |
Restart Requirement | Yes, you must restart your system after you apply this security update. |
Removal Information | Click Control Panel, click System and Security, click Windows Update, and then under See also, click Installed updates and select from the list of updates. |
File information | Not applicable |