SB2017050905 - Multiple vulnerabilities in Microsoft Edge
Published: May 9, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 15 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2017-0228)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.2) Spoofing attack (CVE-ID: CVE-2017-0231)
The vulnerability allows a remote attacker to perform spoofing attack.The vulnerability exists due to an error when rendering SmartScreen Filter in Microsoft browsers. A remote attacker can create a specially crafted web page, trick the victim into visiting it and perform a spoofing attack.
Successful exploitation of the vulnerability may result in unauthorized access to entire database.
3) Memory corruption (CVE-ID: CVE-2017-0238)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.4) Privilege escalation (CVE-ID: CVE-2017-0241)
The vulnerability allows a remote attacker to gain elevated privileges on the target system.
The weakness exists due to improper rendering of domain-less page in the URL by Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, gain elevated privileges, perform actions in the context of the Intranet Zone and access functionality that is not typically available to the browser when browsing in the context of the Internet Zone.
Successful exploitation of the vulnerability results in arbitrary code execution.5) Memory corruption (CVE-ID: CVE-2017-0240)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in Microsoft scripting engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.6) Memory corruption (CVE-ID: CVE-2017-0236)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in Chakra JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.7) Memory corruption (CVE-ID: CVE-2017-0235)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in Chakra JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.8) Memory corruption (CVE-ID: CVE-2017-0234)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in Chakra JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.9) Privilege escalation (CVE-ID: CVE-2017-0233)
The vulnerability allows a remote attacker to gain elevated privileges on the target system.The weakness exists due to improper handling of Sandboxing by Microsoft Edge. A remote attacker can gain elevated privileges and escape from the AppContainer sandbox in the browser.
Successful exploitation of the vulnerability results in privilege escalation.
10) Memory corruption (CVE-ID: CVE-2017-0230)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.11) Memory corruption (CVE-ID: CVE-2017-0229)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.12) Memory corruption (CVE-ID: CVE-2017-0227)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in Microsoft scripting engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.13) Memory corruption (CVE-ID: CVE-2017-0224)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.14) Memory corruption (CVE-ID: CVE-2017-0221)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.15) Memory corruption (CVE-ID: CVE-2017-0266)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in Microsoft scripting engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0228
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0231
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0238
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0241
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0240
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0236
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0235
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0234
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0233
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0230
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0229
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0227
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0221
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0266