Searching
..

Click anywhere to stop

KLA11070
Multiple vulnerabilities in Microsoft Edge and Microsoft Internet Explorer

Updated: 01/22/2024
Detect date
?
07/11/2017
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Microsoft Edge and Microsoft Internet Explorer. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code and spoof user interface.

Below is a complete list of vulnerabilities:

  1. An improper handling of redirect requests in Microsoft browsers can be exploited remotely via a specially designed website to bypass security restrictions;
  2. An improper access to objects in memory in Internet Explorer can be exploited remotely via a specially designed website to execute arbitrary code;
  3. An incorrect handling of objects in memory in Microsoft Edge can be exploited remotely via a specially designed website to execute arbitrary code;
  4. An incorrect applying of Same Origin Policy for HTML elements present in other browser windows in Microsoft Edge can be exploited remotely by convincing a user to load a page or visit a website to bypass security restrictions;
  5. An improper handling of objects in memory in Chakra JavaScript engine in Microsoft Edge can be exploited remotely via a specially designed website to execute arbitrary code;
  6. An improper parsing of HTTP content in Microsoft browsers can be exploited remotely by convincing the user to click a specially designed URL to spoof user interface;
  7. Multiple vulnerabilities related to incorrect handling of objects in memory in JavaScript engine in Microsoft browsers can be exploited remotely via a specially designed website, Microsoft Office document that hosts the browser rendering engine or embedded ActiveX control marked “safe for initialization” in an application to execute arbitrary code;
  8. Multiple vulnerabilities related to incorrect handling of objects in memory in VBScript engine in Microsoft Internet Explorer can be exploited remotely via a specially designed website, Microsoft office document that hosts the browser rendering engine or embedded ActiveX control marked “safe for initialization” in an application to execute arbitrary code.

Technical details

Vulnerability (7), (8) are related to rendering in JavaScript engines.

Affected products

Internet Explorer 9
Internet Explorer 10
Internet Explorer 11
Microsoft Edge
Microsoft Windows 10
Microsoft Windows 7 Service Pack 1
Microsoft Windows 8.1
Microsoft Windows RT 8.1
Microsoft Windows Server 2008 Service Pack 2
Microsoft Windows Server 2008 R2 Service Pack 1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2017-8618
CVE-2017-8619
CVE-2017-8599
CVE-2017-8598
CVE-2017-8617
CVE-2017-8603
CVE-2017-8592
CVE-2017-8601
CVE-2017-8602
CVE-2017-8607
CVE-2017-8596
CVE-2017-8595
CVE-2017-8604
CVE-2017-8609
CVE-2017-8608
CVE-2017-8605
CVE-2017-8611
CVE-2017-8606
CVE-2017-8594
CVE-2017-8610
CVE-2017-8592
CVE-2017-8594
CVE-2017-8595
CVE-2017-8596
CVE-2017-8598
CVE-2017-8599
CVE-2017-8601
CVE-2017-8602
CVE-2017-8603
CVE-2017-8604
CVE-2017-8605
CVE-2017-8606
CVE-2017-8607
CVE-2017-8608
CVE-2017-8609
CVE-2017-8610
CVE-2017-8611
CVE-2017-8617
CVE-2017-8618
CVE-2017-8619

Impacts
?
ACE 
[?]

SB 
[?]

PE 
[?]

SUI 
[?]
Related products
Microsoft Internet Explorer
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft VBScript engine
Microsoft Windows 10
Microsoft Edge
CVE-IDS
?
CVE-2017-85924.3Warning
CVE-2017-85947.6Critical
CVE-2017-85957.6Critical
CVE-2017-85967.6Critical
CVE-2017-85987.6Critical
CVE-2017-85994.3Warning
CVE-2017-86017.6Critical
CVE-2017-86024.3Warning
CVE-2017-86037.6Critical
CVE-2017-86047.6Critical
CVE-2017-86057.6Critical
CVE-2017-86067.6Critical
CVE-2017-86077.6Critical
CVE-2017-86087.6Critical
CVE-2017-86097.6Critical
CVE-2017-86107.6Critical
CVE-2017-86114.3Warning
CVE-2017-86177.6Critical
CVE-2017-86187.6Critical
CVE-2017-86197.6Critical
Microsoft official advisories
Microsoft Security Update Guide
KB list

4038788
4038782
4038783
4038781
4025342
4025339
4025344
4025338
4025331
4025336
4025341
4025252

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Find out the statistics of the vulnerabilities spreading in your region