| Vulnerability Name: | CVE-2018-8466 (CCN-149065) | ||||||||||||
| Assigned: | 2018-09-11 | ||||||||||||
| Published: | 2018-09-11 | ||||||||||||
| Updated: | 2020-08-24 | ||||||||||||
| Summary: | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8367, CVE-2018-8465, CVE-2018-8467. | ||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 7.6 High (CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
| ||||||||||||
| Vulnerability Type: | CWE-787 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-8466 Source: BID Type: Third Party Advisory, VDB Entry 105243 Source: CCN Type: BID-105243 Microsoft ChakraCore Scripting Engine CVE-2018-8466 Remote Memory Corruption Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1041623 Source: XF Type: UNKNOWN ms-chakra-cve20188466-code-exec(149065) Source: CCN Type: Packet Storm Security [10-11-2018] Microsoft Edge Chakra JIT BailOutOnInvalidatedArrayHeadSegment Check Bypass Source: CCN Type: Microsoft Security TechCenter - September 2018 Chakra Scripting Engine Memory Corruption Vulnerability Source: CONFIRM Type: Patch, Vendor Advisory https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8466 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [10-09-2018] Source: EXPLOIT-DB Type: Third Party Advisory, VDB Entry 45571 Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-8466 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||