KLA11166
Multiple vunlerabilities in Microsoft Browsers
Updated: 07/22/2020
Detect date
?
01/03/2018
Severity
?
Critical
Description

Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  2. An information disclosure vulnerability in Microsoft Edge can be exploited remotely via specially crafted to obtain sensitive information.
  3. A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to obtain sensitive information.
  4. A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to obtain sensitive information.
  5. An elevation of privilege vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to gain privileges.
  6. A security feature bypass vulnerability in Scripting Engine can be exploited remotely to bypass security restrictions.
Affected products

Internet Explorer 11
Internet Explorer 10
Internet Explorer 9
Microsoft Edge (EdgeHTML-based)
ChakraCore

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2018-0758
CVE-2018-0762
CVE-2018-0766
CVE-2018-0767
CVE-2018-0768
CVE-2018-0769
CVE-2018-0770
CVE-2018-0772
CVE-2018-0773
CVE-2018-0774
CVE-2018-0775
CVE-2018-0776
CVE-2018-0777
CVE-2018-0778
CVE-2018-0780
CVE-2018-0781
CVE-2018-0800
CVE-2018-0803
CVE-2018-0818

Impacts
?
ACE 
[?]

OSI 
[?]

SB 
[?]

PE 
[?]
Related products
Microsoft Internet Explorer
Microsoft Edge
ChakraCore
CVE-IDS
?
CVE-2018-07580.0Unknown
CVE-2018-07620.0Unknown
CVE-2018-07660.0Unknown
CVE-2018-07670.0Unknown
CVE-2018-07680.0Unknown
CVE-2018-07690.0Unknown
CVE-2018-07700.0Unknown
CVE-2018-07720.0Unknown
CVE-2018-07730.0Unknown
CVE-2018-07740.0Unknown
CVE-2018-07750.0Unknown
CVE-2018-07760.0Unknown
CVE-2018-07770.0Unknown
CVE-2018-07780.0Unknown
CVE-2018-07800.0Unknown
CVE-2018-07810.0Unknown
CVE-2018-08000.0Unknown
CVE-2018-08030.0Unknown
CVE-2018-08180.0Unknown
Microsoft official advisories
Microsoft Security Update Guide
KB list

4056894
4056888
4056890
4056893
4056891
4056892
4056896
4056895
4056568
4088782
4088787
4088786
4088779
4089187
4088878
4088877
4088875
4088776
4088876

Exploitation

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/43491

https://www.exploit-db.com/exploits/43522

https://www.exploit-db.com/exploits/43710

https://www.exploit-db.com/exploits/44075

https://www.exploit-db.com/exploits/43715

https://www.exploit-db.com/exploits/43717

https://www.exploit-db.com/exploits/43723

https://www.exploit-db.com/exploits/43718

https://www.exploit-db.com/exploits/43720

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.