Windows OLE CVE-2014-6332 exploit spotted in the wild (Dec 17,2014)


Remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability is due to Internet Explorer improperly accessing OLE objects in memory. This allows remote attackers to execute arbitrary code via a crafted web site.

CVE-2014-6332 aka Windows OLE Automation Array Remote Code Execution Vulnerability is being exploited in the wild. The vulnerability is due to insufficient error handling when using ReDim Preserve in VBscript.

The exploit code does type confusion. If error occurs during array-redimensioning , the old array size is not preserved . This allows the attacker to read/write memory outside the limits of the original array.

As one can see from the call stack that the vulnerable dll is OLEAUT32.DLL

Microsoft had already released a patch for the vulnerability.Dell SonicWALL Threat Research Team has researched this vulnerability and released the following IPS signature to protect their customers.

  • IPS 5978 : Windows OLE Automation Array Remote Code Execution
Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.