SB2017050905 - Multiple vulnerabilities in Microsoft Edge



SB2017050905 - Multiple vulnerabilities in Microsoft Edge

Published: May 9, 2017

Security Bulletin ID SB2017050905
Severity
High
Patch available
YES
Number of vulnerabilities 15
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 80% Medium 7% Low 13%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 15 secuirty vulnerabilities.


1) Memory corruption (CVE-ID: CVE-2017-0228)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

2) Spoofing attack (CVE-ID: CVE-2017-0231)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to an error when rendering SmartScreen Filter in Microsoft browsers. A remote attacker can create a specially crafted web page, trick the victim into visiting it and perform a spoofing attack.

Successful exploitation of the vulnerability may result in unauthorized access to entire database.

3) Memory corruption (CVE-ID: CVE-2017-0238)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

4) Privilege escalation (CVE-ID: CVE-2017-0241)

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists due to improper rendering of domain-less page in the URL by Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, gain elevated privileges, perform actions in the context of the Intranet Zone and access functionality that is not typically available to the browser when browsing in the context of the Internet Zone.

Successful exploitation of the vulnerability results in arbitrary code execution.



5) Memory corruption (CVE-ID: CVE-2017-0240)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in Microsoft scripting engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

6) Memory corruption (CVE-ID: CVE-2017-0236)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in Chakra JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

7) Memory corruption (CVE-ID: CVE-2017-0235)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in Chakra JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

8) Memory corruption (CVE-ID: CVE-2017-0234)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in Chakra JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

9) Privilege escalation (CVE-ID: CVE-2017-0233)

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists due to improper handling of Sandboxing by Microsoft Edge. A remote attacker can gain elevated privileges and escape from the AppContainer sandbox in the browser.

Successful exploitation of the vulnerability results in privilege escalation.



10) Memory corruption (CVE-ID: CVE-2017-0230)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

11) Memory corruption (CVE-ID: CVE-2017-0229)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

12) Memory corruption (CVE-ID: CVE-2017-0227)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in Microsoft scripting engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

13) Memory corruption (CVE-ID: CVE-2017-0224)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

14) Memory corruption (CVE-ID: CVE-2017-0221)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in Microsoft Edge. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

15) Memory corruption (CVE-ID: CVE-2017-0266)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in Microsoft scripting engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

Remediation

Install update from vendor's website.