SB2018031308 - Multiple vulnerabilities in Microsoft Edge
Published: March 13, 2018 Updated: March 15, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 15 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2018-0893)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
2) Memory corruption (CVE-ID: CVE-2018-0891)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper handling of objects in memory by the scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption view arbitrary data.
3) Memory corruption (CVE-ID: CVE-2018-0930)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the Chakra scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
4) Memory corruption (CVE-ID: CVE-2018-0933)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the Chakra scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
5) Memory corruption (CVE-ID: CVE-2018-0934)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the Chakra scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
6) Memory corruption (CVE-ID: CVE-2018-0936)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the Chakra scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
7) Memory corruption (CVE-ID: CVE-2018-0937)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the Chakra scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
8) Memory corruption (CVE-ID: CVE-2018-0939)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper handling of objects in memory by the scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption view arbitrary data.
9) Memory corruption (CVE-ID: CVE-2018-0872)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the Chakra scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
10) Memory corruption (CVE-ID: CVE-2018-0873)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the Chakra scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
11) Memory corruption (CVE-ID: CVE-2018-0874)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to improper handling of objects in memory by the Chakra scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
12) Memory corruption (CVE-ID: CVE-2018-0927)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper handling of objects in memory by the Microsoft browser. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption view arbitrary data.
13) Memory corruption (CVE-ID: CVE-2018-0932)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper handling of objects in memory by the Microsoft browser. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption view arbitrary data.
14) Memory corruption (CVE-ID: CVE-2018-0879)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper handling of objects in memory by the Microsoft Edge. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption view arbitrary data.
15) Memory corruption (CVE-ID: CVE-2018-0876)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper handling of objects in memory by the scripting engine. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption view arbitrary data.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0893
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0891
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0930
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0933
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0934
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0936
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0937
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0939
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0872
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0873
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0874
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0927
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0932
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0879
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0876