SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   Microsoft Edge Vendors:   Microsoft
Microsoft Edge Multiple Bugs Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Gain Elevated Privileges, and Spoof Content on the Target System
SecurityTracker Alert ID:  1041623
SecurityTracker URL:  http://securitytracker.com/id/1041623
CVE Reference:   CVE-2018-8315, CVE-2018-8354, CVE-2018-8366, CVE-2018-8367, CVE-2018-8425, CVE-2018-8452, CVE-2018-8456, CVE-2018-8457, CVE-2018-8459, CVE-2018-8463, CVE-2018-8464, CVE-2018-8465, CVE-2018-8466, CVE-2018-8467, CVE-2018-8469   (Links to External Site)
Date:  Sep 11 2018
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Microsoft Edge. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially sensitive information on the target system. A remote user can spoof servers.

A remote user can create specially crafted content that, when loaded by the target user, will trigger an object memory handling error in the Chakra scripting engine and execute arbitrary code on the target user's system [CVE-2018-8367, CVE-2018-8456, CVE-2018-8459, CVE-2018-8465, CVE-2018-8466, CVE-2018-8467].

A remote user can create specially crafted content that, when loaded by the target user, will trigger an object memory handling error and execute arbitrary code on the target user's system [CVE-2018-8354].

A remote user can create specially crafted content that, when loaded by the target user, will read privileged data across trust boundaries [CVE-2018-8315].

A remote user can create specially crafted HTML content that, when loaded by the target user, will spoof a target web site [CVE-2018-8425].

The Microsoft Edge Fetch API does not properly handle a filtered response type. A remote user can access potentially sensitive information from a different origin as URL parameters [CVE-2018-8366].

A remote user can exploit a separate vulnerability and then escape from the AppContainer sandbox in the browser [CVE-2018-8469, CVE-2018-8463].

A remote user can create specially crafted content that, when loaded by the target user, will trigger an object memory handling error and access potentially sensitive information on the target user's system [CVE-2018-8452].

A remote user can create specially crafted content that, when loaded by the target user, will trigger an object memory handling error and execute arbitrary code on the target user's system [CVE-2018-8457]. This can also be exploited via an embedded ActiveX control marked "safe for initialization" in an application or via a Microsoft Office document that hosts the scripting rendering engine.

A remote user can create specially crafted content that, when loaded by the target user, will trigger an object memory handling error in the Microsoft Edge PDF Reader and execute arbitrary code on the target user's system [CVE-2018-8464].

Yuki Chen of Qihoo 360 Vulcan Team, Qixun Zhao of Qihoo 360 Vulcan Team, Anonymous (via Trend Micro's Zero Day Initiative), Jonathan Birch of Microsoft Corporation, Michael Holman, Microsoft Chakra Core Team, Jun Kokatsu, Windows & Devices Group - Operating System Security Team, James Lee @Windowsrcer of Kryptos Logic, Yu Zhou of Ant-financial Light-Year Security Lab, Lokihardt of Google Project Zero, and Omri Herscovici of Check Point reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can obtain potentially sensitive information on the target system.

A remote user can spoof content.

Solution:   The vendor has issued a fix.

The Microsoft advisories are available at:

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8315
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8354
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8366
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8367
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8425
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8452
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8456
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8457
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8459
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8463
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8464
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8465
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8466
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8467
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8469

Vendor URL:  portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8315 (Links to External Site)
Cause:   Access control error, Authentication error
Underlying OS:  Windows (10)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Sep 11 2018 (Microsoft Issues Fix for Microsoft Internet Explorer) Microsoft Edge Multiple Bugs Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, Gain Elevated Privileges, and Spoof Content on the Target System
Microsoft has issued a fix for Microsoft Internet Explorer.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC