SB2018031306 - Multiple vulnerabilities in Microsoft Internet Explorer
Published: March 13, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2018-0889)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
2) Memory corruption (CVE-ID: CVE-2018-0891)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper handling of objects in memory by the scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption view arbitrary data.
3) Memory corruption (CVE-ID: CVE-2018-0935)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
4) Memory corruption (CVE-ID: CVE-2018-0927)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper handling of objects in memory by the Microsoft browser. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption view arbitrary data.
5) Memory corruption (CVE-ID: CVE-2018-0929)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by Internet Explorer. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
6) Memory corruption (CVE-ID: CVE-2018-0932)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper handling of objects in memory by the Microsoft browser. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption view arbitrary data.
7) Privilege escalation (CVE-ID: CVE-2018-0942)
The vulnerability allows a remote attacker to gain elevated privileges on the target system.The weakness exists due to improper control checking by Internet Explorer. A remote attacker can escape sandbox and gain system privileges.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0889
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0891
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0935
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0927
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0929
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0932
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0942