Описание
Multiple serious vulnerabilities have been found in Microsoft Internet Explorer and Microsoft Edge. Malicious users can exploit these vulnerabilities to to gain privileges, execute arbitrary code, bypass security restrictions and obtain sensitive information.
Below is a complete list of vulnerabilities:
- An improper handling of objects in memory in Microsoft browsers can be exploited remotely via a specially designed website to execute arbitrary code;
- An incorrect access to objects in memory in Microsoft Edge can be exploited remotely via a specially designed website to execute arbitrary code;
- An improper handling of objects in memory in the JScript and VBScript engines in Internet Explorer can be exploited remotely via a specially crafted website to execute arbitrary code;
- An incorrect access to objects in memory in Internet Explorer can be exploited remotely via a specially designed website to execute arbitrary code;
- An improper validation of documents in Microsoft Edge Content Security Policy can be exploited remotely via certain specially designed documents to trick a user into loading a web page with malicious content;
- An incorrect handling of objects in memory in the Chakra scripting engine can be exploited remotely via a specially designed website to obtain sensitive information;
- An improper enforcing of cross-domain policies in Internet Explorer can be exploited remotely via a specially designed website to gain privileges.
Первичный источник обнаружения
- CVE-2017-0205
CVE-2017-0203
CVE-2017-0202
CVE-2017-0201
CVE-2017-0200
CVE-2017-0093
CVE-2017-0208
CVE-2017-0210
CVE-2017-0093
CVE-2017-0200
CVE-2017-0201
CVE-2017-0202
CVE-2017-0203
CVE-2017-0205
CVE-2017-0208
CVE-2017-0210
Эксплуатация
Public exploits exist for this vulnerability.
Связанные продукты
Список CVE
- CVE-2017-0093 critical
- CVE-2017-0200 critical
- CVE-2017-0201 critical
- CVE-2017-0202 critical
- CVE-2017-0203 warning
- CVE-2017-0205 critical
- CVE-2017-0208 warning
- CVE-2017-0210 warning
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!