Lucene search

K
symantecSymantec Security ResponseSMNTC-103998
HistoryApr 23, 2018 - 12:00 a.m.

Microsoft Internet Explorer VBScript Engine CVE-2018-8174 Arbitrary Code Execution Vulnerability

2018-04-2300:00:00
Symantec Security Response
www.symantec.com
856

0.974 High

EPSS

Percentile

99.9%

Description

Microsoft Internet Explorer is prone to an unspecified arbitrary code-execution vulnerability. Attackers can exploit this vulnerability to execute arbitrary code in the context of the affected application. Note: This issue was previously titled โ€˜Microsoft Internet Explorer Unspecified Arbitrary Code Execution Vulnerabilityโ€™. The title have been changed to better reflect the vulnerability information.

Technologies Affected

  • Microsoft Internet Explorer 10
  • Microsoft Internet Explorer 11
  • Microsoft Internet Explorer 8
  • Microsoft Internet Explorer 9
  • Microsoft Windows 10 Version 1607 for 32-bit Systems
  • Microsoft Windows 10 Version 1607 for x64-based Systems
  • Microsoft Windows 10 Version 1803 for 32-bit Systems
  • Microsoft Windows 10 Version 1803 for x64-based Systems
  • Microsoft Windows 10 version 1703 for 32-bit Systems
  • Microsoft Windows 10 version 1703 for x64-based Systems
  • Microsoft Windows 10 version 1709 for 32-bit Systems
  • Microsoft Windows 10 version 1709 for x64-based Systems

Recommendations

Block external access at the network boundary, unless external parties require service.
If global access isnโ€™t needed, filter access to the affected computer at the network boundary. Restricting access to only trusted computers and networks might greatly reduce the likelihood of successful exploits.

Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.

Do not accept or execute files from untrusted or unknown sources.
To reduce the likelihood of successful exploits, do not open or handle files from unknown or untrusted locations.

Do not follow links provided by unknown or untrusted sources.
Never follow links provided by unfamiliar or untrusted sources or visit sites of questionable integrity.

Updates are available. Please see the references or vendor advisory for more information.