SB2017050904 - Multiple vulnerabilities in Microsoft Internet Explorer
Published: May 9, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Security bypass (CVE-ID: CVE-2017-0064)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to improper input validation. A remote attacker can create a specially crafted website containing attacker-controlled content, trick the victim into opening it, bypass Mixed Content warnings and load unsecure content (HTTP) from secure locations (HTTPS).
Successful exploitation of the vulnerability results in security bypass.
2) Memory corruption (CVE-ID: CVE-2017-0222)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.Note: the vulnerability is being actively exploited.
3) Memory corruption (CVE-ID: CVE-2017-0226)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.4) Memory corruption (CVE-ID: CVE-2017-0228)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.5) Spoofing attack (CVE-ID: CVE-2017-0231)
The vulnerability allows a remote attacker to perform spoofing attack.The vulnerability exists due to an error when rendering SmartScreen Filter in Microsoft browsers. A remote attacker can create a specially crafted web page, trick the victim into visiting it and perform a spoofing attack.
Successful exploitation of the vulnerability may result in unauthorized access to entire database.
6) Memory corruption (CVE-ID: CVE-2017-0238)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution.Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0064
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0222
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0226
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0228
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0231
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0238