SB2017071114 - Multiple vulnerabilities in Microsoft Internet Explorer



SB2017071114 - Multiple vulnerabilities in Microsoft Internet Explorer

Published: July 11, 2017 Updated: July 11, 2017

Security Bulletin ID SB2017071114
Severity
High
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 71% Low 29%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Spoofing attack (CVE-ID: CVE-2017-8602)

The disclosed vulnerability allows a remote attacker to perform spoofing attack.

The weakness exists due to improper parsing of HTTP content. A remote attacker can trick the victim to follow a specially crafted link and perform a spoofing attack.

2) Open redirect (CVE-ID: CVE-2017-8592)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to improper handling of redirect requests by Microsoft Browsers. A remote attacker can create a specially crafted link, bypass CORS redirect restrictions and redirect the victim on potentially dangerous website.

3) Memory corruption (CVE-ID: CVE-2017-8606)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to improper handling of objects in memory in Microsoft browsers by JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

4) Memory corruption (CVE-ID: CVE-2017-8607)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to improper handling of objects in memory in Microsoft browsers by JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

5) Memory corruption (CVE-ID: CVE-2017-8608)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to improper handling of objects in memory in Microsoft browsers by JavaScript engines. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

6) Memory corruption (CVE-ID: CVE-2017-8594)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to improper handling of objects in memory by Internet Explorer. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

7) Memory corruption (CVE-ID: CVE-2017-8618)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to improper handling of objects in memory by VBScript engine. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

Remediation

Install update from vendor's website.