SB2017080813 - Multiple vulnerabilities in Microsoft Edge



SB2017080813 - Multiple vulnerabilities in Microsoft Edge

Published: August 8, 2017

Security Bulletin ID SB2017080813
Severity
High
Patch available
YES
Number of vulnerabilities 29
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 72% Low 28%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 29 secuirty vulnerabilities.


1) Memory corruption (CVE-ID: CVE-2017-8518)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to improper handling objects in memory by Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

2) Memory corruption (CVE-ID: CVE-2017-8634)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

3) Memory corruption (CVE-ID: CVE-2017-8635)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

4) Memory corruption (CVE-ID: CVE-2017-8636)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

5) Security restrictions bypass (CVE-ID: CVE-2017-8637)

The vulnerability allows a local attacker to bypass security restrictions on the target system.

The weakness exists in Microsoft Edge due to how memory is accessed in code compiled by the Edge Just-In-Time (JIT) compiler. A local attacker can visit a specially crafted website and bypass Arbitrary Code Guard (ACG).

Successful exploitation of the vulnerability may result in further attacks.

6) Memory corruption (CVE-ID: CVE-2017-8638)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

7) Memory corruption (CVE-ID: CVE-2017-8639)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

8) Memory corruption (CVE-ID: CVE-2017-8640)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

9) Information disclosure (CVE-ID: CVE-2017-8662)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to improper validation of strings in specific scenarios by Microsoft Edge. A remote attacker can run an affected application, gain access to arbitrary files and bypass Address Space Layout Randomization (ASLR).

Successful exploitation of the vulnerability may result in further attacks.

10) Memory corruption (CVE-ID: CVE-2017-8670)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

11) Memory corruption (CVE-ID: CVE-2017-8671)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

12) Memory corruption (CVE-ID: CVE-2017-8672)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

13) Memory corruption (CVE-ID: CVE-2017-8641)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

14) Cross-site scripting (CVE-ID: CVE-2017-8642)

The disclosed vulnerability allows a remote authenticated attacker to perform cross-site scripting (XSS) attacks.

The vulnerability is caused by incorrect filtration of input data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim’s browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

15) Cross-site scripting (CVE-ID: CVE-2017-8644)

The disclosed vulnerability allows a remote authenticated attacker to perform cross-site scripting (XSS) attacks.

The vulnerability is caused by incorrect filtration of input data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim’s browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

16) Memory corruption (CVE-ID: CVE-2017-8645)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

17) Memory corruption (CVE-ID: CVE-2017-8646)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

18) Memory corruption (CVE-ID: CVE-2017-8647)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

19) Cross-site scripting (CVE-ID: CVE-2017-8650)

The disclosed vulnerability allows a remote authenticated attacker to perform cross-site scripting (XSS) attacks.

The vulnerability is caused by incorrect filtration of input data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim’s browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

20) Memory corruption (CVE-ID: CVE-2017-8655)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

21) Memory corruption (CVE-ID: CVE-2017-8656)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

22) Cross-site scripting (CVE-ID: CVE-2017-8652)

The disclosed vulnerability allows a remote authenticated attacker to perform cross-site scripting (XSS) attacks.

The vulnerability is caused by incorrect filtration of input data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim’s browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

23) Memory corruption (CVE-ID: CVE-2017-8657)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

24) Cross-site scripting (CVE-ID: CVE-2017-8659)

The disclosed vulnerability allows a remote authenticated attacker to perform cross-site scripting (XSS) attacks.

The vulnerability is caused by incorrect filtration of input data by the Chakra scripting engine. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim’s browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

25) Memory corruption (CVE-ID: CVE-2017-8661)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft scripting engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

26) Memory corruption (CVE-ID: CVE-2017-8674)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browser JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

27) Privilege escalation (CVE-ID: CVE-2017-8503)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper access controls. A local attacker can gain elevated privileges and break out of the Edge AppContainer sandbox.

28) Memory corruption (CVE-ID: CVE-2017-8669)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browsers. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

29) Memory corruption (CVE-ID: CVE-2017-8653)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to an error when handling objects in memory by Microsoft browsers. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with system privileges.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Install update from vendor's website.

References