SB2017061401 - Multiple vulnerabilities in Microsoft Edge
Published: June 14, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 17 secuirty vulnerabilities.
1) Security bypass (CVE-ID: CVE-2017-8530)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to improper enforcing of cross-domain policies by Microsoft Edge. A remote attacker can trick the victim into loading a specially crafted page with malicious content, bypass same-origin policies and access information from origins outside the current one.
Successful exploitation of the vulnerability results in security bypass.
2) Memory corruption (CVE-ID: CVE-2017-8548)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft browsers by the JavaScript scripting engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
3) Memory corruption (CVE-ID: CVE-2017-8549)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the JavaScript scripting engine. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
4) Security bypass (CVE-ID: CVE-2017-8555)
The vulnerability allows a remote attacker to bypass security restriction on the target system.
The weakness exists due to improper input validation of the Edge Content Security Policy (CSP). A remote attacker can create a specially crafted website containing malicious content, trick the victim into loading it and bypass security restrictions.
5) Memory corruption (CVE-ID: CVE-2017-8496)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
6) Memory corruption (CVE-ID: CVE-2017-8497)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
7) Information disclosure (CVE-ID: CVE-2017-8498)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists in the Microsoft Edge that allows JavaScript XML DOM objects to detect installed browser extensions. A remote attacker can create a specially crafted website containing malicious content, trick the victim into visiting it and read arbitrary files that may be used to conduct further attacks.
8) Memory corruption (CVE-ID: CVE-2017-8499)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the JavaScript scripting engine. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
9) Information disclosure (CVE-ID: CVE-2017-8504)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to incorrect handling of a filtered response type by Microsoft Edge Fetch API. A remote attacker can create a specially crafted website containing malicious content, trick the victim into viewing it and read the URL of a cross-origin request.
Successful exploitation of the vulnerability may result in information disclosure.
10) Memory corruption (CVE-ID: CVE-2017-8517)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft browsers by the JavaScript scripting engine. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
11) Memory corruption (CVE-ID: CVE-2017-8520)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the Microsoft Edge JavaScript scripting engine. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
12) Memory corruption (CVE-ID: CVE-2017-8521)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the Microsoft Edge JavaScript scripting engine. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
13) Memory corruption (CVE-ID: CVE-2017-8522)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft browsers by the JavaScript scripting engine. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
14) Security bypass (CVE-ID: CVE-2017-8523)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to improper applying of Same Origin Policy for HTML elements. A remote attacker can create a specially crafted website containing malicious content, trick the victim into visiting it and bypass security restrictions.
15) Memory corruption (CVE-ID: CVE-2017-8524)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft browsers by the JavaScript scripting engine. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
16) Information disclosure (CVE-ID: CVE-2017-8529)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to incorrect handling of objects in memory by Microsoft scripting engines. A remote attacker can create a specially crafted website containing malicious content, trick the victim into viewing it and detect specific files that may be used to conduct further attacks.
Successful exploitation of the vulnerability may result in information disclosure.17) Memory corruption (CVE-ID: CVE-2017-0223)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory Microsoft browsers by the JavaScript scripting engine. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8530
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8548
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8549
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8555
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8496
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8497
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8498
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8499
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8504
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8517
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8520
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8521
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8522
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8523
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8524
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8529
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0223