CVE-2014-1776 Workaround Tool

Update: Microsoft has released a patch for this.

CVE-2014-1776 Workaround Tool
CVE-2014-1776 Workaround Tool

I’m working on a small Visual Basic.NET application to help apply one of Microsoft’s proposed workarounds to the latest Internet Explorer vulnerability by unregistering the vgx.dll file.

This tool is available free of charge and can be downloaded from my site.  You can also download the source code.

Please check the download with your antivirus software before running it.

System Requirements

  • Windows XP SP2+, Vista, 7, 8/8.1, 2003, 2008/2008R2, 2012/2012R2
  • Microsoft .NET Framework 2.0+

Download ZIP File (Binary):

MSSQL Find Last Date & Time Database Table Accessed

This is a T-SQL that will show all the last access date and time for Select, tables in a database.

sys.dm_db_index_usage_stats i JOIN
sys.tables t ON (t.object_id = i.object_id)
database_id = db_id()

Source: SQL Authority

Additional Information/Links:  SQL Blog


MSSQL Server Uptime Using T-SQL

A sample T-SQL for determining uptime of a Microsoft SQL Server.

USE master
DECLARE @crdate DATETIME, @hr VARCHAR(50), @min VARCHAR(5)
SELECT @crdate=crdate FROM sysdatabases WHERE NAME='tempdb'
SELECT @hr=(DATEDIFF ( mi, @crdate,GETDATE()))/60
IF ((DATEDIFF ( mi, @crdate,GETDATE()))/60)=0
SELECT @min=(DATEDIFF ( mi, @crdate,GETDATE()))
SELECT @min=(DATEDIFF ( mi, @crdate,GETDATE()))-((DATEDIFF( mi, @crdate,GETDATE()))/60)*60
PRINT 'SQL Server "' + CONVERT(VARCHAR(20),SERVERPROPERTY('SERVERNAME'))+'" is Online for the past '+@hr+' hours & '+@min+' minutes'
IF NOT EXISTS (SELECT 1 FROM master.dbo.sysprocesses WHERE program_name = N'SQLAgent - Generic Refresher')
PRINT 'SQL Server is running but SQL Server Agent < > running'
PRINT 'SQL Server and SQL Server Agent both are running'

Example Output:

SQL Server "MSSQL01" is Online for the past 1438 hours & 7 minutes
SQL Server and SQL Server Agent both are running

Source: MSDN Social

Error Copying File or Folder: The Environment is Incorrect.

I don’t understand this error that Microsoft threw at my face at 5PM tonight before going home…  I was trying to copy a file from a Windows 7 Professional system to a network share via UNC path (Server 2003 R2) and I got this wacky error:


A quick Google search was useless for this (at least in my quick efforts).

[su_label type=success]Solution[/su_label]  Rebooted Windows 7 machine.

*sigh*  Time to go home.

Microsoft Internet Explorer Vulnerability: CVE-2014-1776

width=75I have been inundated with questions about the latest vulnerability relating to Microsoft Internet Explorer and thought I would put together a brief post to use for reference.  Microsoft has issued a Security Advisory detailing this a bit more in-depth if you’re interested.

Am I Affected?

If you use Internet Explorer on Windows XP, Vista, 7, or 8/8.1/8.1U1 — yes, you are affected.

If you use Internet Explorer on Microsoft Windows Server platforms (2003, 2003R2, 2008, 2008R2, 2012, 2012R2) you may not be affected if Enhanced Security Configuration is still enabled as this mitigates the vulnerability.  ESC is enabled by default on the Microsoft Windows Server platforms but server administrators have been known to disable this not only for Administrators but for Users which would make the systems vulnerable.

Affected version of Internet Explorer:

  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11

Note Windows RT is affected, but not really. Windows RT does not allow installation of software outside the Windows Store, so although it is technically affected, it’s technically also not affected.

How can I Protect Myself?

Get EMET 4.0+

I cannot strongly enough recommend downloading and installing Microsoft’s EMET tool.

This tool mitigates this vulnerability, as well as many more and is available free from Microsoft. EMET is the Ehanced Mitigation Experience Toolkit designed to help protect applications from exposure to certain vulnerabilities by adding another layer of protection.

Windows 8 and Internet Explorer 10: If you have Internet Explorer 10 and are on Windows 8, KB2790907 must be installed to use EMET.

Windows XP users take note:  You will not be receiving a patch when Microsoft publishes a fix, however, you can still download and use EMET to mitigate this as well as use a few of the workarounds mentioned below.

Is there a Workaround?

Yes, there are quite a few options actually to help mitigate this vulnerability. The following method is what I prefer. Other methods include:

  • Enable Enhanced Protection Mode
    • Requires Internet Explorer 10 or 11 and 64-bit Windows operating system.  Click image for larger version.
  • Set Internet Zone security to High to make running ActiveX objects Prompt before running.
    • This would be extremely annoying to most users since it would be prompting almost all the time when visiting any modern website.
  • Change ACL on VGX.dll
    • This method can cause headaches down the road during Windows Updates if you do not remember to change the ACL back.
  • Unregister VGX.DLL
    • This is my preferred method and will get re-registered upon later Windows Updates installations.

Unregister VGX.DLL

I think this is ultimately the best workaround. Why? This is targeting the source of the problem.

Unregister the vgx.dll file. This is the source of the issue and by disabling this file, you will no longer have support for VML. Don’t know what VML is? You probably don’t need it. Maybe double-check with your IT folks before doing this.

Open a command prompt, or paste the following (including the quotes) into the Start > Run box.

egsvr32.exe" -u "%CommonProgramFiles%Microsoft SharedVGXvgx.dll"

Example output:

Unregister VGX.DLL

Unregister VPX.DLL


2014-04-30 – fixed typos (vpx>vgx) thanks @jduck

2014-04-29 – fixed command typo, added ‘-u’ as it was omitted