SB2018010410 - Multiple vulnerabilities in Microsoft Edge



SB2018010410 - Multiple vulnerabilities in Microsoft Edge

Published: January 4, 2018

Security Bulletin ID SB2018010410
Severity
High
Patch available
YES
Number of vulnerabilities 19
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 74% Medium 26%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 19 secuirty vulnerabilities.


1) Security restrictions bypass (CVE-ID: CVE-2018-0818)

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to an error in Microsoft Chakra scripting engine that allows Control Flow Guard (CFG) to be bypassed. A remote attacker can create a specially crafted website, trick the victim into visiting it, and bypass implemented CFG.

This vulnerability can be used along with another vulnerability to successfully compromise the affected system.

2) Memory corruption (CVE-ID: CVE-2018-0773)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


3) Memory corruption (CVE-ID: CVE-2018-0774)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


4) Memory corruption (CVE-ID: CVE-2018-0781)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


5) Memory corruption (CVE-ID: CVE-2018-0758)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


6) Memory corruption (CVE-ID: CVE-2018-0762)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


7) Memory corruption (CVE-ID: CVE-2018-0768)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


8) Memory corruption (CVE-ID: CVE-2018-0769)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


9) Memory corruption (CVE-ID: CVE-2018-0770)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


10) Memory corruption (CVE-ID: CVE-2018-0772)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


11) Memory corruption (CVE-ID: CVE-2018-0775)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


12) Memory corruption (CVE-ID: CVE-2018-0776)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


13) Memory corruption (CVE-ID: CVE-2018-0777)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


14) Memory corruption (CVE-ID: CVE-2018-0778)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


15) Memory corruption (CVE-ID: CVE-2018-0780)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing content in browser. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.


16) Cross-domain policy bypass (CVE-ID: CVE-2018-0803)

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to improper enforcement of cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain. A remote attacker can create a specially crafted web page, trick the victim into opening it and replace contents in another user's tab.

Successful exploitation of the vulnerability may allow an attacker to steal victim's credentials to another website, perform phishing and drive-by download attacks.


17) Out-of-bounds read (CVE-ID: CVE-2018-0800)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary error when processing web contents in browser. A remote attacker can trick the victim into visiting a specially crafted web page, trigger out-of-bounds read and gain access to potentially sensitive data.


18) Out-of-bounds read (CVE-ID: CVE-2018-0766)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary error when processing web contents in browser. A remote attacker can trick the victim into visiting a specially crafted web page, trigger out-of-bounds read and gain access to potentially sensitive data.


19) Out-of-bounds read (CVE-ID: CVE-2018-0767)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary error when processing web contents in browser. A remote attacker can trick the victim into visiting a specially crafted web page, trigger out-of-bounds read and gain access to potentially sensitive data.


Remediation

Install update from vendor's website.