Microsoft OLE Remote Code Execution Vulnerability (CVE-2014-6352)

Source: Internet
Author: User
Tags cve

Microsoft OLE Remote Code Execution Vulnerability (CVE-2014-6352)

Release date:
Updated on:

Affected Systems:
Microsoft Windows Vista
Microsoft Windows Server 2012
Microsoft Windows Server 2008
Microsoft Windows RT
In Microsoft Windows 8.1
Microsoft Windows 8
Microsoft Windows 7
Description:
Bugtraq id: 70690
CVE (CAN) ID: CVE-2014-6352

OLE (Object link and embedding) is a technology that allows applications to share data and functions. UAC (User Account Control) is a new technology that Microsoft introduces in Windows Vista to improve system security.

Microsoft Windows has a security vulnerability in the implementation of OLE components. unauthenticated remote attackers can exploit this vulnerability to execute remote code. This vulnerability is caused by the failure to properly process Office files containing OLE objects.

<* Source: Microsoft
Drew Hintz
Jon Huntley
Matty Pellegrino
Haifei Li
Bing Sun

Link: https://technet.microsoft.com/library/security/3010060
*>

Suggestion:
Temporary solution:

If you cannot install or upgrade the patch immediately, NSFOCUS recommends that you take the following measures to reduce the threat:

* Apply the Microsoft Fix it solution "OLE packager Shim Workaround" to prevent this vulnerability.
* Do not open Microsoft PowerPoint files or other files from suspicious sources.
* Enable UAC.
* Deploy Enhanced Mitigation Experience Toolkit 5.0 and Configure Attack Surface rendering.

Vendor patch:

Microsoft
---------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:

Http://technet.microsoft.com/security/bulletin/

This article permanently updates the link address:

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.