Lucene search

K
kasperskyKaspersky LabKLA71043
HistoryJul 25, 2024 - 12:00 a.m.

KLA71043 Multiple vulnerabilities in Microsoft Browser

2024-07-2500:00:00
Kaspersky Lab
threats.kaspersky.com
7
microsoft browser
use after free
arbitrary code execution
denial of service
sensitive information
information disclosure
microsoft edge
inappropriate implementation
heap buffer overflow
remote code execution
html
angle
layout
canvas
css
fedcm
loader
tabs
user education
fullscreen
dawn
downloads
frames
safe

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.001

Percentile

38.5%

Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, execute arbitrary code, spoof user interface, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Inappropriate implementation vulnerability in HTML can be exploited to cause denial of service.
  2. Insufficient validation of untrusted input vulnerability in Safe can be exploited to bypass security restrictions.
  3. Use after free vulnerability in Downloads can be exploited to cause denial of service or execute arbitrary code.
  4. Use after free vulnerability in Loader can be exploited to cause denial of service or execute arbitrary code.
  5. Use after free vulnerability in Tabs can be exploited to cause denial of service or execute arbitrary code.
  6. Denial of service vulnerability in Frames can be exploited remotely to cause denial of service.
  7. Use after free vulnerability in CSS can be exploited to cause denial of service or execute arbitrary code.
  8. Inappropriate implementation vulnerability in FedCM can be exploited to cause denial of service.
  9. Use after free vulnerability in User Education can be exploited to cause denial of service or execute arbitrary code.
  10. Use after free vulnerability in Dawn can be exploited to cause denial of service or execute arbitrary code.
  11. Heap buffer overflow vulnerability in Layout can be exploited to cause denial of service.
  12. Inappropriate implementation vulnerability in Fullscreen can be exploited to cause denial of service.
  13. An information disclosure vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to obtain sensitive information.
  14. A remote code execution vulnerability in Microsoft Edge (Chromium-based) can be exploited remotely to execute arbitrary code.

Original advisories

CVE-2024-6997

CVE-2024-6998

CVE-2024-6989

CVE-2024-6995

CVE-2024-6991

CVE-2024-38103

CVE-2024-7001

CVE-2024-6999

CVE-2024-6994

CVE-2024-6988

CVE-2024-6996

CVE-2024-7004

CVE-2024-39379

CVE-2024-7005

CVE-2024-7000

CVE-2024-7003

Related products

Microsoft-Edge

CVE list

CVE-2024-7001 unknown

CVE-2024-7005 unknown

CVE-2024-6988 unknown

CVE-2024-6989 unknown

CVE-2024-6997 unknown

CVE-2024-6996 unknown

CVE-2024-7000 unknown

CVE-2024-6999 unknown

CVE-2024-7004 unknown

CVE-2024-6998 unknown

CVE-2024-6991 unknown

CVE-2024-7003 unknown

CVE-2024-6994 unknown

CVE-2024-6995 unknown

CVE-2024-38103 high

CVE-2024-39379 high

KB list

Solution

Install necessary updates from the Settings and more menu, that are listed in your About Microsoft Edge page (Microsoft Edge About page usually can be accessed from the Help and feedback option)

Microsoft Edge update settings

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Microsoft Edge (Chromium-based)

References

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.001

Percentile

38.5%