Vulnerability Description
Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted HTML document in conjunction with a Cascading Style Sheets (CSS) token sequence specifying the run-in value for the display property, leading to improper CElement reference counting.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Internet Explorer | - |
References
- http://www.securityfocus.com/bid/71483
- http://zerodayinitiative.com/advisories/ZDI-14-403/
- http://www.securityfocus.com/bid/71483
- http://zerodayinitiative.com/advisories/ZDI-14-403/
FAQ
What is CVE-2014-8967?
CVE-2014-8967 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted HTML document in conjunction with a Cascading Style Sheets (CSS) token seque...
How severe is CVE-2014-8967?
CVE-2014-8967 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-8967?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Internet Explorer.