Vulnerability Name: | CVE-2017-11809 (CCN-132596) | ||||||||||||
Assigned: | 2017-10-10 | ||||||||||||
Published: | 2017-10-10 | ||||||||||||
Updated: | 2017-10-20 | ||||||||||||
Summary: | ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.6 High (CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-11809 Source: BID Type: Third Party Advisory, VDB Entry 101137 Source: CCN Type: BID-101137 Microsoft Edge Scripting Engine CVE-2017-11809 Remote Memory Corruption Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1039532 Source: XF Type: UNKNOWN ms-edge-cve201711809-code-exec(132596) Source: CCN Type: Packet Storm Security [10-14-2017] Microsoft Edge Chakra StackScriptFunction::BoxState::Box Uninitialized Pointers Source: CCN Type: Microsoft Security TechCenter Scripting Engine Memory Corruption Vulnerability Source: CONFIRM Type: Patch, Vendor Advisory https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11809 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [10-17-2017] Source: EXPLOIT-DB Type: Third Party Advisory, VDB Entry 42999 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |