KLA12430
Multiple vulnerabilities in Microsoft Browser

Updated: 03/28/2023
Detect date
?
01/20/2022
Severity
?
Warning
Description

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in web packaging can be exploited to cause denial of service or execute arbitrary code.
  2. Heap buffer overflow vulnerability in Task Manager can be exploited to execute arbitrary code or cause denial of service.
  3. Use after free vulnerability in safe browsing can be exploited to cause denial of service or execute arbitrary code.
  4. Implementation vulnerability in Storage can be exploited to cause denial of service.
  5. Race condition vulnerability in GPU Watchdog can be exploited to cause denial of service.
  6. Heap buffer overflow vulnerability in PDFium can be exploited to execute arbitrary code or cause denial of service.
  7. Use after free vulnerability in Omnibox can be exploited to cause denial of service or execute arbitrary code.
  8. Use after free vulnerability in Bookmarks can be exploited to cause denial of service or execute arbitrary code.
  9. Use after free vulnerability in Vulkan can be exploited to cause denial of service or execute arbitrary code.
  10. Implementation vulnerability in Autofill can be exploited to cause denial of service.
  11. Implementation vulnerability in Service Worker API can be exploited to cause denial of service.
  12. Use after free vulnerability in Optimization Guide can be exploited to cause denial of service or execute arbitrary code.
  13. Use after free vulnerability in Data Transfer can be exploited to cause denial of service or execute arbitrary code.
  14. Use after free vulnerability in site isolation can be exploited to cause denial of service or execute arbitrary code.
  15. Use after free vulnerability in Scheduling can be exploited to cause denial of service or execute arbitrary code.
  16. Use after free vulnerability in Printing can be exploited to cause denial of service or execute arbitrary code.
  17. Implementation vulnerability in Fenced Frames can be exploited to cause denial of service.
  18. Implementation vulnerability in push messaging can be exploited to cause denial of service.
  19. Heap buffer overflow vulnerability in DevTools can be exploited to execute arbitrary code or cause denial of service.
  20. Use after free vulnerability in Text Input Method Editor can be exploited to cause denial of service or execute arbitrary code.
Affected products

Microsoft Edge (Chromium-based)

Solution

Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)
Microsoft Edge update settings

Original advisories

CVE-2022-0293
CVE-2022-0311
CVE-2022-0289
CVE-2022-0310
CVE-2022-0291
CVE-2022-0303
CVE-2022-0306
CVE-2022-0302
CVE-2022-0304
CVE-2022-0297
CVE-2022-0309
CVE-2022-0305
CVE-2022-0307
CVE-2022-0295
CVE-2022-0308
CVE-2022-0290
CVE-2022-0298
CVE-2022-0296
CVE-2022-0292
CVE-2022-0294
CVE-2022-0301
CVE-2022-0300

Impacts
?
ACE 
[?]

DoS 
[?]

SB 
[?]
Related products
Microsoft Edge
CVE-IDS
?
Microsoft official advisories
Microsoft Security Update Guide
Find out the statistics of the vulnerabilities spreading in your region