Lucene search

K
kasperskyKaspersky LabKLA11422
HistoryFeb 12, 2019 - 12:00 a.m.

KLA11422 Multiple vulnerabilities in Microsoft Browsers

2019-02-1200:00:00
Kaspersky Lab
threats.kaspersky.com
37

7.6 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.082 Low

EPSS

Percentile

94.4%

Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information, gain privileges, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  2. A spoofing vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to spoof user interface.
  3. An information disclosure vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to obtain sensitive information.
  4. An information disclosure vulnerability in Scripting Engine can be exploited remotely to obtain sensitive information.
  5. A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
  6. An elevation of privilege vulnerability in Scripting Engine can be exploited remotely to gain privileges.
  7. A security feature bypass vulnerability in Microsoft Edge can be exploited remotely to bypass security restrictions.
  8. A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
  9. An information disclosure vulnerability in Scripting Engine can be exploited remotely via specially crafted content to obtain sensitive information.
  10. An information disclosure vulnerability in Internet Explorer can be exploited remotely to obtain sensitive information.

Original advisories

CVE-2019-0644

CVE-2019-0654

CVE-2019-0640

CVE-2019-0610

CVE-2019-0605

CVE-2019-0607

CVE-2019-0655

CVE-2019-0643

CVE-2019-0651

CVE-2019-0648

CVE-2019-0650

CVE-2019-0649

CVE-2019-0634

CVE-2019-0641

CVE-2019-0652

CVE-2019-0590

CVE-2019-0606

CVE-2019-0591

CVE-2019-0658

CVE-2019-0645

CVE-2019-0593

CVE-2019-0642

CVE-2019-0676

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Internet-Explorer

Microsoft-Edge

ChakraCore

CVE list

CVE-2019-0607 critical

CVE-2019-0644 critical

CVE-2019-0593 critical

CVE-2019-0642 critical

CVE-2019-0590 critical

CVE-2019-0651 critical

CVE-2019-0652 critical

CVE-2019-0655 critical

CVE-2019-0640 critical

CVE-2019-0605 critical

CVE-2019-0658 warning

CVE-2019-0610 critical

CVE-2019-0649 high

CVE-2019-0591 critical

CVE-2019-0654 warning

CVE-2019-0643 warning

CVE-2019-0648 warning

CVE-2019-0650 critical

CVE-2019-0634 critical

CVE-2019-0641 warning

CVE-2019-0606 critical

CVE-2019-0645 critical

CVE-2019-0676 warning

KB list

4487020

4487017

4486996

4487026

4487025

4487044

4487018

4487000

4486563

4486474

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft EdgeChakraCoreInternet Explorer 10Internet Explorer 11Internet Explorer 9

References

7.6 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.082 Low

EPSS

Percentile

94.4%