SB2017091212 - Multiple vulnerabilities in Microsoft Edge
Published: September 12, 2017 Updated: September 12, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 29 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2017-8597)
The vulnerability allows a remote attacker to obtain potentially sensitive information in the target system.The weakness exists due to improper handling of objects in memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and view arbitrary files on the target system.
2) Information disclosure (CVE-ID: CVE-2017-8643)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of clipboard events. A remote attacker can trick the victim into visiting a specially crafted website, leave it open during clipboard activities and view arbitrary files on the system.
3) Memory corruption (CVE-ID: CVE-2017-11766)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when Microsoft Edge accesses objects in memory. A remote attacker can convince the victim to take action, typically by way of enticement in an email or Instant Messenger message, or by opening an attachment sent through email, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Memory corruption (CVE-ID: CVE-2017-8757)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when Microsoft Edge handles objects in memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
5) Security restrictions bypass (CVE-ID: CVE-2017-8754)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to an error when validation of user-supplied input by Edge Content Security Policy (CSP). A remote attacker can trick the victim into into loading a page containing malicious content, bypass security restrictions and inject the malicious page into either a compromised website or an advertisement network.
6) Memory corruption (CVE-ID: CVE-2017-8751)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when Microsoft Edge accesses objects in memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Cross-site scripting (CVE-ID: CVE-2017-8735)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
8) Memory corruption (CVE-ID: CVE-2017-8734)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when Microsoft Edge accesses objects in memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
9) Memory corruption (CVE-ID: CVE-2017-8731)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when Microsoft Edge accesses objects in memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
10) Cross-site scripting (CVE-ID: CVE-2017-8724)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
11) Security restrictions bypass (CVE-ID: CVE-2017-8723)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to an error when validation of user-supplied input by Edge Content Security Policy (CSP). A remote attacker can trick the victim into into loading a page containing malicious content, bypass security restrictions and inject the malicious page into either a compromised website or an advertisement network.
12) Memory corruption (CVE-ID: CVE-2017-8748)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to Microsoft browser JavaScript engines render content when handling objects in memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
13) Memory corruption (CVE-ID: CVE-2017-11764)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to an error when the scripting engine handles objects in memory in Microsoft Edge. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
14) Memory corruption (CVE-ID: CVE-2017-8756)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to an error when the scripting engine handles objects in memory in Microsoft Edge. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
15) Memory corruption (CVE-ID: CVE-2017-8755)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to an error when the scripting engine handles objects in memory in Microsoft Edge. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
16) Memory corruption (CVE-ID: CVE-2017-8753)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to an error when the scripting engine handles objects in memory in Microsoft Edge. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
17) Memory corruption (CVE-ID: CVE-2017-8752)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to an error when the scripting engine handles objects in memory in Microsoft Edge. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
18) Memory corruption (CVE-ID: CVE-2017-8741)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to Microsoft browser JavaScript engines render content when handling objects in memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
19) Memory corruption (CVE-ID: CVE-2017-8740)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to an error when the scripting engine handles objects in memory in Microsoft Edge. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
20) Memory corruption (CVE-ID: CVE-2017-8738)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to an error when the scripting engine handles objects in memory in Microsoft Edge. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
21) Memory corruption (CVE-ID: CVE-2017-8729)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to an error when the scripting engine handles objects in memory in Microsoft Edge. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
22) Memory corruption (CVE-ID: CVE-2017-8660)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to Microsoft browser JavaScript engines render content when handling objects in memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
23) Memory corruption (CVE-ID: CVE-2017-8649)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to Microsoft browser JavaScript engines render content when handling objects in memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
24) Information disclosure (CVE-ID: CVE-2017-8739)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of objects in memory in Microsoft Edge by the scripting engine. A remote attacker can trick the victim into visiting a specially crafted website and gain access to potentially sensitive information.
25) Information disclosure (CVE-ID: CVE-2017-8736)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists in Microsoft browsers due to improper parent domain verification in certain functionality. A remote attacker can trick the victim into visiting a specially crafted website and obtain specific information that is used in the parent domain.
26) Information disclosure (CVE-ID: CVE-2017-8648)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to improper handling of objects in memory by Microsoft Edge. A remote attacker can trick the victim into visiting a specially crafted website and gain access to potentially sensitive information.
27) Memory corruption (CVE-ID: CVE-2017-8750)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when Microsoft Edge accesses objects in memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
28) Memory corruption (CVE-ID: CVE-2017-8737)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists in Microsoft Windows PDF Library due to improper handling of objects in memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
29) Memory corruption (CVE-ID: CVE-2017-8728)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists in Microsoft Windows PDF Library due to improper handling of objects in memory. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8597
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8643
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11766
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8757
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8754
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8751
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8735
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8734
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8731
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8724
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8723
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8748
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11764
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8756
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8755
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8753
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8752
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8741
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8740
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8738
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8729
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8660
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8649
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8739
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8736
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8648
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8750
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8737
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8728