KLA12329
Multiple vulnerability in Microsoft Browser

Updated: 10/26/2021
Detect date
?
10/21/2021
Severity
?
Warning
Description

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in Incognito can be exploited to cause denial of service or execute arbitrary code.
  2. Heap buffer overflow vulnerability in Skia can be exploited to cause denial of service.
  3. Validation of untrusted input vulnerability in Downloads can be exploited to bypass security restrictions.
  4. Use after free vulnerability in PDF Accessibility can be exploited to cause denial of service or execute arbitrary code.
  5. Use after free vulnerability in Profiles can be exploited to cause denial of service or execute arbitrary code.
  6. Heap buffer overflow vulnerability in PDFium can be exploited to cause denial of service.
  7. Implementation vulnerability in Blink can be exploited to cause denial of service.
  8. Implementation vulnerability in WebView can be exploited to cause denial of service.
  9. Use after free vulnerability in Network APIs can be exploited to cause denial of service or execute arbitrary code.
  10. Heap buffer overflow vulnerability in Settings can be exploited to cause denial of service.
  11. Use after free vulnerability in Dev Tools can be exploited to cause denial of service or execute arbitrary code.
  12. Out of bounds read vulnerability in WebAudio can be exploited to cause denial of service or obtain sensitive information.
  13. Implementation vulnerability in WebApp Installer can be exploited to cause denial of service.
  14. An information disclosure vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to obtain sensitive information.
  15. Implementation vulnerability in iFrame Sandbox can be exploited to cause denial of service.
  16. Race condition vulnerability in V8 can be exploited to cause denial of service.
  17. Use after free vulnerability in V8 can be exploited to cause denial of service or execute arbitrary code.
Affected products

Microsoft Edge (Chromium-based)

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2021-37982
CVE-2021-37981
CVE-2021-37996
CVE-2021-37993
CVE-2021-37988
CVE-2021-37984
CVE-2021-37989
CVE-2021-37990
CVE-2021-37987
CVE-2021-37986
CVE-2021-37983
CVE-2021-37992
CVE-2021-37995
CVE-2021-42307
CVE-2021-37994
CVE-2021-37991
CVE-2021-37985

Impacts
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]
Related products
Microsoft Edge
CVE-IDS
?
CVE-2021-379860.0Unknown
CVE-2021-379840.0Unknown
CVE-2021-379930.0Unknown
CVE-2021-379810.0Unknown
CVE-2021-379850.0Unknown
CVE-2021-379950.0Unknown
CVE-2021-379910.0Unknown
CVE-2021-379830.0Unknown
CVE-2021-379890.0Unknown
CVE-2021-379880.0Unknown
CVE-2021-379900.0Unknown
CVE-2021-379940.0Unknown
CVE-2021-379820.0Unknown
CVE-2021-379960.0Unknown
CVE-2021-379920.0Unknown
CVE-2021-379870.0Unknown
CVE-2021-423070.0Unknown
Find out the statistics of the vulnerabilities spreading in your region