SB2017071113 - Multiple vulnerabilities in Microsoft Edge
Published: July 11, 2017 Updated: August 8, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 19 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2017-8595)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.2) Memory corruption (CVE-ID: CVE-2017-8605)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.3) Memory corruption (CVE-ID: CVE-2017-8596)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.4) Memory corruption (CVE-ID: CVE-2017-8617)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.5) Security restrictions bypass (CVE-ID: CVE-2017-8599)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to improper applying of Same Origin Policy for HTML elements. A remote attacker can create a specially crafted website containing malicious content, trick the victim into visiting it and bypass security restrictions.
6) Memory corruption (CVE-ID: CVE-2017-8619)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.7) Memory corruption (CVE-ID: CVE-2017-8598)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.8) Memory corruption (CVE-ID: CVE-2017-8601)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by Chakra JavaScript engine in Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
9) Memory corruption (CVE-ID: CVE-2017-8603)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.10) Memory corruption (CVE-ID: CVE-2017-8604)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
11) Memory corruption (CVE-ID: CVE-2017-8609)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft browsers by the Scripting Engine. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.12) Memory corruption (CVE-ID: CVE-2017-8610)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory in Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
13) Spoofing attack (CVE-ID: CVE-2017-8611)
The disclosed vulnerability allows a remote attacker to perform spoofing attack.The weakness exists due to improper parsing of HTTP content by Microsoft Edge. A remote attacker can trick the victim to follow a specially crafted link and perform a spoofing attack.
14) Spoofing attack (CVE-ID: CVE-2017-8602)
The disclosed vulnerability allows a remote attacker to perform spoofing attack.The weakness exists due to improper parsing of HTTP content. A remote attacker can trick the victim to follow a specially crafted link and perform a spoofing attack.
15) Memory corruption (CVE-ID: CVE-2017-8608)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to improper handling of objects in memory in Microsoft browsers by JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.16) Memory corruption (CVE-ID: CVE-2017-8607)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to improper handling of objects in memory in Microsoft browsers by JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.17) Memory corruption (CVE-ID: CVE-2017-8606)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to improper handling of objects in memory in Microsoft browsers by JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.18) Open redirect (CVE-ID: CVE-2017-8592)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to improper handling of redirect requests by Microsoft Browsers. A remote attacker can create a specially crafted link, bypass CORS redirect restrictions and redirect the victim on potentially dangerous website.
19) Memory corruption (CVE-ID: CVE-2017-8518)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling objects in memory by Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8595
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8605
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8596
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8617
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8599
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8619
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8598
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8601
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8603
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8604
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8609
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8610
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8611
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8608
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8607
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8606
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8592
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8518