MS KB2963983: Vulnerability in Internet Explorer Could Allow Remote Code Execution

high Nessus Plugin ID 73739
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote host is affected by a remote code execution vulnerability.


The remote host is missing one of the workarounds referenced in Microsoft Security Advisory 2963983.

The remote Internet Explorer install is affected by an unspecified use-after-free vulnerability related to the VML and Flash components.
By exploiting this flaw, a remote, unauthenticated attacker could execute arbitrary code on the remote host subject to the privileges of the user running the affected application.


Apply the IE settings and workarounds suggested by Microsoft in security advisory 2963983.

See Also

Plugin Details

Severity: High

ID: 73739

File Name: smb_kb2963983.nasl

Version: Revision: 1.7

Type: local

Agent: windows

Family: Windows

Published: 4/28/2014

Updated: 8/30/2017

Dependencies: microsoft_emet_installed.nasl, smb_hotfixes.nasl, microsoft_ie_esc_detect.nbin

Risk Information


Risk Factor: High

Base Score: 9.3

Temporal Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:ND/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:ie

Required KB Items: SMB/Registry/Enumerated, SMB/WindowsVersion, SMB/IE/Version

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 4/26/2014

Reference Information

CVE: CVE-2014-1776

BID: 67075

OSVDB: 106311

CERT: 222929

MSKB: 2963983