Searching
..

Click anywhere to stop

KLA12049
Multiple vulnerabilities in Microsoft Browsers

Обновлено: 25/01/2024
Дата обнаружения
21/01/2021
Уровень угрозы
Warning
Описание

Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in WebSQL can be exploited to cause denial of service or execute arbitrary code.
  2. Heap buffer overflow vulnerability in Blink can be exploited to cause denial of service.
  3. Implementation vulnerability in Performace API can be exploited to potentially cause denial of service.
  4. Data validation vulnerability in File System API can be exploited to bypass security restrictions.
  5. Policy enforcement vulnerability in WebView can be exploited to bypass security restrictions.
  6. Policy enforcement vulnerability in extensions can be exploited to bypass security restrictions.
  7. Policy enforcement vulnerability in File System API can be exploited to bypass security restrictions.
  8. Use after free vulnerability in Speech Recognizer can be exploited to cause denial of service or execute arbitrary code.
  9. Use after free vulnerability in Media can be exploited to cause denial of service or execute arbitrary code.
  10. Uninitialized use vulnerability in USB can be exploited to bypass security restrictions.
  11. Use after free vulnerability in Blink can be exploited to cause denial of service or execute arbitrary code.
  12. Use after free vulnerability in Omnibox can be exploited to cause denial of service or execute arbitrary code.
  13. Implementation vulnerability in DevTools can be exploited to potentially cause denial of service.
  14. Implementation vulnerability in iframe sandbox can be exploited to potentially cause denial of service.
  15. Use after free vulnerability in WebRTC can be exploited to cause denial of service or execute arbitrary code.
  16. Security UI vulnerability in Page Info can be exploited to spoof user interface.
  17. Data validation vulnerability in V8 can be exploited to bypass security restrictions.
  18. Policy enforcement vulnerability in Downloads can be exploited to bypass security restrictions.
Пораженные продукты

Microsoft Edge (Chromium-based)

Решение

Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)
Microsoft Edge update settings

Первичный источник обнаружения
CVE-2021-21120
CVE-2021-21128
CVE-2021-21135
CVE-2021-21123
CVE-2021-21130
CVE-2021-21126
CVE-2021-21125
CVE-2021-21136
CVE-2021-21141
CVE-2021-21124
CVE-2021-21119
CVE-2021-21140
CVE-2021-21122
CVE-2021-21121
CVE-2021-21127
CVE-2021-21137
CVE-2021-21129
CVE-2021-21139
CVE-2020-16044
CVE-2021-21132
CVE-2021-21134
CVE-2021-21118
CVE-2021-21133
CVE-2021-21131
Оказываемое влияние
?
ACE 
[?]

DoS 
[?]

SB 
[?]

SUI 
[?]
Связанные продукты
Microsoft Edge
CVE-IDS