SB2017050904 - Multiple vulnerabilities in Microsoft Internet Explorer



SB2017050904 - Multiple vulnerabilities in Microsoft Internet Explorer

Published: May 9, 2017

Security Bulletin ID SB2017050904
Severity
Critical
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 17% High 50% Medium 17% Low 17%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Security bypass (CVE-ID: CVE-2017-0064)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to improper input validation. A remote attacker can create a specially crafted website containing attacker-controlled content, trick the victim into opening it, bypass Mixed Content warnings and load unsecure content (HTTP) from secure locations (HTTPS).

Successful exploitation of the vulnerability results in security bypass.


2) Memory corruption (CVE-ID: CVE-2017-0222)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

Note: the vulnerability is being actively exploited.

3) Memory corruption (CVE-ID: CVE-2017-0226)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

4) Memory corruption (CVE-ID: CVE-2017-0228)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

5) Spoofing attack (CVE-ID: CVE-2017-0231)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error when rendering SmartScreen Filter in Microsoft browsers. A remote attacker can create a specially crafted web page, trick the victim into visiting it and perform a spoofing attack.

Successful exploitation of the vulnerability may result in unauthorized access to entire database.

6) Memory corruption (CVE-ID: CVE-2017-0238)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

Remediation

Install update from vendor's website.