SB2017031415 - Multiple vulnerabilities in Microsoft Edge
Published: March 14, 2017 Updated: March 15, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 28 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2017-0010)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Information disclosure (CVE-ID: CVE-2017-0011)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to unspecified error. A remote unauthenticated attacker can gain access to potentially sensitive data.
3) Memory corruption (CVE-ID: CVE-2017-0015)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Information disclosure (CVE-ID: CVE-2017-0017)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to unspecified error. A remote unauthenticated attacker can gain access to potentially sensitive data.
5) Memory corruption (CVE-ID: CVE-2017-0032)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
6) Memory corruption (CVE-ID: CVE-2017-0034)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption error when accessing objects in memory. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Memory corruption (CVE-ID: CVE-2017-0035)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
8) Information disclosure (CVE-ID: CVE-2017-0065)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to unspecified error. A remote unauthenticated attacker can gain access to potentially sensitive data.
9) Same-origin policy bypass (CVE-ID: CVE-2017-0066)
The disclosed vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to improper handling of HTML elements present in other browser windows. A remote attacker can trick the victim to visit a specially crafted web page, bypass same-origin policy restrictions and gain access to potentially sensitive information located in a separate browser window.
10) Same-origin policy bypass (CVE-ID: CVE-2017-0135)
The disclosed vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to improper handling of HTML elements present in other browser windows. A remote attacker can trick the victim to visit a specially crafted web page, bypass same-origin policy restrictions and gain access to potentially sensitive information located in a separate browser window.
11) Same-origin policy bypass (CVE-ID: CVE-2017-0140)
The disclosed vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to improper handling of HTML elements present in other browser windows. A remote attacker can trick the victim to visit a specially crafted web page, bypass same-origin policy restrictions and gain access to potentially sensitive information located in a separate browser window.
12) Memory corruption (CVE-ID: CVE-2017-0067)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
13) Information disclosure (CVE-ID: CVE-2017-0068)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to unspecified error. A remote unauthenticated attacker can gain access to potentially sensitive data.
14) Spoofing attack (CVE-ID: CVE-2017-0069)
The disclosed vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to unknown error. A remote attacker can trick the victim to follow a specially crafted link and perform a spoofing attack.
15) Use-after-free error (CVE-ID: CVE-2017-0070)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
16) Memory corruption (CVE-ID: CVE-2017-0071)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
17) Memory corruption (CVE-ID: CVE-2017-0094)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
18) Memory corruption (CVE-ID: CVE-2017-0131)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
19) Memory corruption (CVE-ID: CVE-2017-0132)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
20) Memory corruption (CVE-ID: CVE-2017-0133)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
21) Memory corruption (CVE-ID: CVE-2017-0134)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
22) Memory corruption (CVE-ID: CVE-2017-0136)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
23) Memory corruption (CVE-ID: CVE-2017-0137)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
24) Memory corruption (CVE-ID: CVE-2017-0138)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
25) Memory corruption (CVE-ID: CVE-2017-0141)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
26) Memory corruption (CVE-ID: CVE-2017-0150)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
27) Memory corruption (CVE-ID: CVE-2017-0151)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to memory corruption in Microsoft scripting engine. A remote unauthenticated attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
28) Memory corruption (CVE-ID: CVE-2017-0023)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when processing PDF files in Microsoft Windows PDF Library. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.