KLA11318
Multiple vulnerabilities in Microsoft Browsers
Updated: 11/06/2018
CVSS
?
7.5
Detect date
?
09/11/2018
Severity
?
Critical
Description

Multiple serious vulnerabilities were found in Microsoft browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, bypass security restrictions and spoof user interface.

Below is a complete list of vulnerabilities:

  1. A memory corruption vulnerability in Chakra scripting engine can be exploited remotely via specially crafted website to execute arbitrary code.
  2. A memory corruption vulnerability in ChakraCore scripting engine can be exploited remotely to execute arbitrary code.
  3. A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
  4. An information disclosure vulnerability in Microsoft browsers can be exploited remotely via specially crafted content to obtain sensitive information.
  5. An elevation of privileges vulnerability in Microsoft Edge can be exploited remotely via escape from the AppContainer sandbox to gain privileges.
  6. A remote code execution vulnerability in Chakra scripting engine can be exploited remotely via specially crafted website to execute arbitrary code.
  7. An information disclosure vulnerability in browser scripting engine can be exploited remotely via conviction a user to visit a malicious site to obtain sensitive information.
  8. An information disclosure vulnerability in Microsoft Edge Fetch API can be exploited remotely via reading the URL of a cross-origin request to obtain sensitive information.
  9. A security feature bypass vulnerability in Internet Explorer can be exploited remotely via crafted malicious website to bypass security restrictions.
  10. A remote code execution vulnerability in Microsoft Edge PDF Reader can be exploited remotely via specially crafted PDF content to execute arbitrary code.
  11. A remote code execution vulnerability in Chakra scripting engine can be exploited remotely via specially crafted website to execute arbitrary code.
  12. A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
  13. A spoofing vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to spoof user interface.
  14. A remote code execution vulnerability in Microsoft browsers can be exploited remotely via specially crafted website to execute arbitrary code.
  15. A memory corruption vulnerability in Chakra scripting engine can be exploited remotely via specially crafted website to execute arbitrary code.
  16. A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
Affected products

Internet Explorer 11
Microsoft Edge
ChakraCore
Internet Explorer 10
Internet Explorer 9

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2018-8466
CVE-2018-8459
CVE-2018-8456
CVE-2018-8354
CVE-2018-8452
CVE-2018-8469
CVE-2018-8467
CVE-2018-8315
CVE-2018-8366
CVE-2018-8470
CVE-2018-8464
CVE-2018-8367
CVE-2018-8447
CVE-2018-8425
CVE-2018-8457
CVE-2018-8465
CVE-2018-8463
CVE-2018-8461

Impacts
?
ACE 
[?]

OSI 
[?]

SB 
[?]

PE 
[?]

SUI 
[?]
Related products
Microsoft Internet Explorer
Microsoft Edge
CVE-IDS
?

CVE-2018-8466
CVE-2018-8315
CVE-2018-8459
CVE-2018-8367
CVE-2018-8354
CVE-2018-8452
CVE-2018-8456
CVE-2018-8465
CVE-2018-8467
CVE-2018-8469
CVE-2018-8366
CVE-2018-8470
CVE-2018-8464
CVE-2018-8447
CVE-2018-8425
CVE-2018-8457
CVE-2018-8463
CVE-2018-8461

KB list

4458010
4457128
4457131
4457132
4457142
4457138
4457129
4457144
4457135
4457426

Microsoft official advisories
Microsoft Security Update Guide