SB2017041205 - Multiple vulnerabilities in Microsoft Edge
Published: April 12, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2017-0205)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in Microsoft Edge. A remote unauthenticated attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in remote code execution.
2) Memory corruption (CVE-ID: CVE-2017-0093)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in Scripting Engine. A remote unauthenticated attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in remote code execution.
3) Memory corruption (CVE-ID: CVE-2017-0200)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error in Microsoft Edge. A remote unauthenticated attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in remote code execution.
4) Information disclosure (CVE-ID: CVE-2017-0208)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to boundary error in Chakra scripting engine. A remote unauthenticated attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and access important data on the target system.
Successful exploitation of this vulnerability may result in information disclosure.
5) Security bypass (CVE-ID: CVE-2017-0203)
The vulnerability allows a remote attacker to bypass security resrtrictions.
The vulnerability exists due to improper input validation by the Edge Content Security Policy. A remote unauthenticated attacker can create a specially crafted Web site, trick the victim into visiting it and bypass sertain security restrictions.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0205
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0093
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0200
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0208
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0203