KLA12519
Multiple vulnerabilities in Microsoft Browser

Обновлено: 28/03/2023
Дата обнаружения
28/04/2022
Уровень угрозы
Warning
Описание

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, bypass security restrictions, gain privileges, spoof user interface.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in Device API can be exploited to cause denial of service or execute arbitrary code.
  2. Data validation vulnerability in Dev Tools can be exploited to cause denial of service.
  3. Data validation vulnerability in Trusted Types can be exploited to cause denial of service.
  4. Implementation vulnerability in WebGL can be exploited to cause denial of service.
  5. Use after free vulnerability in SwiftShader can be exploited to cause denial of service or execute arbitrary code.
  6. Use after free vulnerability in Browser Switcher can be exploited to cause denial of service or execute arbitrary code.
  7. Implementation vulnerability in HTML Parser can be exploited to cause denial of service.
  8. Data validation vulnerability in Blink Editing can be exploited to cause denial of service.
  9. Use after free vulnerability in Bookmarks can be exploited to cause denial of service or execute arbitrary code.
  10. Heap buffer overflow vulnerability in Web UI Settings can be exploited to cause denial of service.
  11. Implementation vulnerability in Extensions API can be exploited to cause denial of service.
  12. Use after free vulnerability in File System can be exploited to cause denial of service or execute arbitrary code.
  13. Use after free vulnerability in Dev Tools can be exploited to cause denial of service or execute arbitrary code.
  14. Implementation vulnerability in Input can be exploited to cause denial of service.
  15. Use after free vulnerability in Vulkan can be exploited to cause denial of service or execute arbitrary code.
  16. Implementation vulnerability in iframe can be exploited to cause denial of service.
  17. Use after free vulnerability in ANGLE can be exploited to cause denial of service or execute arbitrary code.
  18. Use after free vulnerability in Sharing can be exploited to cause denial of service or execute arbitrary code.
  19. Security UI vulnerability in Downloads can be exploited to bypass security restrictions.
  20. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  21. Elevation of privilege vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to gain privileges.
  22. Spoofing vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to spoof user interface.
  23. Heap buffer overflow vulnerability in WebGPU can be exploited to cause denial of service.
  24. Implementation vulnerability in WebAuthentication can be exploited to cause denial of service.
  25. Use after free vulnerability in Ozone can be exploited to cause denial of service or execute arbitrary code.
Пораженные продукты

Microsoft Edge (Chromium-based)

Решение

Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)
Microsoft Edge update settings

Первичный источник обнаружения
CVE-2022-1480
CVE-2022-1500
CVE-2022-1494
CVE-2022-1482
CVE-2022-1478
CVE-2022-1490
CVE-2022-1498
CVE-2022-1492
CVE-2022-1491
CVE-2022-1484
CVE-2022-1488
CVE-2022-1485
CVE-2022-1493
CVE-2022-1497
CVE-2022-1477
CVE-2022-1501
CVE-2022-1479
CVE-2022-1481
CVE-2022-1495
CVE-2022-1486
CVE-2022-29146
CVE-2022-29147
CVE-2022-1483
CVE-2022-1499
CVE-2022-1487
Оказываемое влияние
?
ACE 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]

SUI 
[?]
Связанные продукты
Microsoft Edge
CVE-IDS
CVE-2022-14975.0Critical
CVE-2022-14905.0Critical
CVE-2022-14775.0Critical
CVE-2022-14825.0Critical
CVE-2022-14875.0Critical
CVE-2022-14885.0Critical
CVE-2022-14785.0Critical
CVE-2022-14855.0Critical
CVE-2022-15005.0Critical
CVE-2022-14915.0Critical
CVE-2022-14925.0Critical
CVE-2022-14955.0Critical
CVE-2022-14815.0Critical
CVE-2022-14835.0Critical
CVE-2022-14865.0Critical
CVE-2022-14945.0Critical
CVE-2022-14845.0Critical
CVE-2022-14935.0Critical
CVE-2022-15015.0Critical
CVE-2022-14795.0Critical
CVE-2022-14985.0Critical
CVE-2022-14805.0Critical
CVE-2022-14995.0Critical