From winvulns-announcements at bigmail.bigfix.com Wed Nov 8 05:21:14 2017 From: winvulns-announcements at bigmail.bigfix.com (Notification of New Vulnerabilties to Windows Systems Fixlet Messages) Date: Wed, 8 Nov 2017 05:21:14 -0800 Subject: [Winvulns-announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Vulnerabilities to Windows Systems' Message-ID: Fixlet Site - 'Vulnerabilities to Windows Systems' Current Version: 569 Published: Tue, 07 Nov 2017 22:25:17 GMT New Fixlets: ============ *************************************************************** Title: Internet Explorer Information Disclosure Vulnerability - CVE-2017-11822 Severity: High Fixlet ID: 338701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3387 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11822 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Internet Explorer Information Disclosure Vulnerability. *************************************************************** Title: Internet Explorer Information Disclosure Vulnerability - CVE-2017-11813 Severity: High Fixlet ID: 338901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3389 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11813 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Internet Explorer Information Disclosure Vulnerability. *************************************************************** Title: Win32k Elevation of Privilege Vulnerability - CVE-2017-8694 Severity: Medium Fixlet ID: 339001 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3390 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8694 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Microsoft Windows Kernel Mode Driver on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8689. *************************************************************** Title: Win32k Elevation of Privilege Vulnerability - CVE-2017-8689 Severity: Medium Fixlet ID: 339102 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3391 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8689 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Microsoft Windows Kernel Mode Driver on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability when it fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-8694. *************************************************************** Title: Microsoft Graphics Information Disclosure Vulnerability - CVE-2017-8693 Severity: Low Fixlet ID: 339301 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3393 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8693 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user?s system. *************************************************************** Title: Windows Graphics Component Elevation of Privilege Vulnerability - CVE-2017-11824 Severity: Medium Fixlet ID: 339701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3397 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11824 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. *************************************************************** Title: Windows SMB Information Disclosure Vulnerability - CVE-2017-11815 Severity: Low Fixlet ID: 341602 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3416 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11815 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Microsoft Server Block Message (SMB) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability in the way that it handles certain requests, aka "Windows SMB Information Disclosure Vulnerability". *************************************************************** Title: Windows Subsystem for Linux Denial of Service Vulnerability - CVE-2017-8703 Severity: Medium Fixlet ID: 342101 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3421 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8703 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Microsoft Windows Subsystem for Linux on Microsoft Windows 10 1703 allows a denial of service vulnerability when it improperly handles objects in memory, aka "Windows Subsystem for Linux Denial of Service Vulnerability". *************************************************************** Title: Windows Information Disclosure Vulnerability - CVE-2017-11817 Severity: Low Fixlet ID: 342201 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3422 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11817 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Microsoft Windows Kernel component on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, allows an information disclosure vulnerability when it improperly validates objects in memory, aka "Windows Information Disclosure Vulnerability". *************************************************************** Title: Windows Elevation of Privilege Vulnerability - CVE-2017-11783 Severity: Medium Fixlet ID: 342401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3424 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11783 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability in the way it handles calls to Advanced Local Procedure Call (ALPC), aka "Windows Elevation of Privilege Vulnerability". *************************************************************** Title: Microsoft Windows Security Feature Bypass - CVE-2017-11823 Severity: High Fixlet ID: 342501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3425 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11823 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Microsoft Device Guard on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a security feature bypass by the way it handles Windows PowerShell sessions, aka "Microsoft Windows Security Feature Bypass". *************************************************************** Title: Windows Shell Memory Corruption Vulnerability - CVE-2017-8727 Severity: High Fixlet ID: 342701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3427 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8727 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to how Microsoft Windows Text Services Framework handles objects in memory, aka "Windows Shell Memory Corruption Vulnerability". *************************************************************** Title: Windows DNSAPI Remote Code Execution Vulnerability - CVE-2017-11779 Severity: High Fixlet ID: 342802 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3428 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11779 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Microsoft Windows Domain Name System (DNS) DNSAPI.dll on Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it fails to properly handle DNS responses, aka "Windows DNSAPI Remote Code Execution Vulnerability". *************************************************************** Title: Windows Shell Remote Code Execution Vulnerability - CVE-2017-11819 Severity: High Fixlet ID: 342901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3429 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11819 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Windows 7 SP1 allows an attacker to execute arbitrary code in the context of the current user, due to how Microsoft browsers handle objects in memory, aka "Windows Shell Remote Code Execution Vulnerability". *************************************************************** Title: TRIE Remote Code Execution Vulnerability - CVE-2017-11769 Severity: High Fixlet ID: 343001 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3430 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11769 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Microsoft Windows TRIE component on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability in the way it handles loading dll files, aka "TRIE Remote Code Execution Vulnerability". *************************************************************** Title: Windows Security Feature Bypass Vulnerability - CVE-2017-8715 Severity: Medium Fixlet ID: 343201 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3432 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8715 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Microsoft Device Guard on Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a security feature bypass by the way it handles Windows PowerShell sessions, aka "Windows Security Feature Bypass". *************************************************************** Title: Windows Storage Security Feature Bypass Vulnerability - CVE-2017-11818 Severity: Medium Fixlet ID: 346501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3465 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11818 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Microsoft Windows Storage component on Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a security feature bypass vulnerability when it fails to validate an integrity-level check, aka "Windows Storage Security Feature Bypass Vulnerability". *************************************************************** Title: Microsoft Edge Information Disclosure Vulnerability - CVE-2017-8726 Severity: Medium Fixlet ID: 347201 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3472 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-8726 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how affected Microsoft scripting engines handle objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11794 and CVE-2017-11803. *************************************************************** Title: Windows GDI Information Disclosure Vulnerability - CVE-2017-11816 Severity: Low Fixlet ID: 347401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3474 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11816 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Microsoft Windows Graphics Device Interface (GDI) on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an information disclosure vulnerability in the way it handles objects in memory, aka "Windows GDI Information Disclosure Vulnerability". *************************************************************** Title: Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service - CVE-2016-0798 Severity: High Fixlet ID: 351101 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3511 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0798 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c. *************************************************************** Title: The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message - CVE-2016-0800 Severity: Medium Fixlet ID: 351201 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3512 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0800 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack. *************************************************************** Title: The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times - CVE-2016-0702 Severity: Low Fixlet ID: 351301 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3513 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0702 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack. *************************************************************** Title: The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths - CVE-2016-0799 Severity: High Fixlet ID: 351402 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3514 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0799 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842. *************************************************************** Title: Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service - CVE-2016-0797 Severity: Medium Fixlet ID: 351501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3515 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0797 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c. *************************************************************** Title: The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value - CVE-2016-0703 Severity: Medium Fixlet ID: 352301 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3523 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0703 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800. *************************************************************** Title: An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes - CVE-2016-070 Severity: Medium Fixlet ID: 352401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3524 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0704 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800. *************************************************************** Title: The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange - CVE-2016-0701 Severity: Low Fixlet ID: 352501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3525 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0701 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file. From winvulns-announcements at bigmail.bigfix.com Wed Nov 15 05:21:20 2017 From: winvulns-announcements at bigmail.bigfix.com (Notification of New Vulnerabilties to Windows Systems Fixlet Messages) Date: Wed, 15 Nov 2017 05:21:20 -0800 Subject: [Winvulns-announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Vulnerabilities to Windows Systems' Message-ID: Fixlet Site - 'Vulnerabilities to Windows Systems' Current Version: 570 Published: Tue, 14 Nov 2017 20:29:57 GMT New Fixlets: ============ *************************************************************** Title: Incorrect signature handing in Networking - CVE-2017-5066 Severity: Fixlet ID: 282401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A2824 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5066 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Incorrect signature handing in Networking. *************************************************************** Title: Incorrect UI in Blink - CVE-2017-5065 Severity: Fixlet ID: 282501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A2825 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5065 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Incorrect UI in Blink. *************************************************************** Title: Use after free in Blink - CVE-2017-5064 Severity: Fixlet ID: 282701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A2827 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5064 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Use after free in Blink. *************************************************************** Title: Heap overflow in Skia - CVE-2017-5063 Severity: Fixlet ID: 282801 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A2828 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5063 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Heap overflow in Skia. *************************************************************** Title: Address spoofing in Omnibox - CVE-2017-5072 Severity: Fixlet ID: 343301 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3433 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5072 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Address spoofing in Omnibox *************************************************************** Title: Type confusion in V8 - CVE-2017-5070 Severity: Medium Fixlet ID: 343401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3434 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5070 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Type confusion in V8 *************************************************************** Title: UI spoofing in Blink - CVE-2017-5079 Severity: Fixlet ID: 343601 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3436 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5079 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: UI spoofing in Blink *************************************************************** Title: Address spoofing in Omnibox - CVE-2017-5076 Severity: Fixlet ID: 343701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3437 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5076 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Address spoofing in Omnibox *************************************************************** Title: Possible command injection in mailto handling - CVE-2017-5078 Severity: Fixlet ID: 343801 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3438 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5078 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Possible command injection in mailto handling *************************************************************** Title: Use after free in Apps Bluetooth - CVE-2017-5074 Severity: Medium Fixlet ID: 343901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3439 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5074 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Use after free in Apps Bluetooth *************************************************************** Title: UI spoofing in Blink - CVE-2017-5083 Severity: Fixlet ID: 344001 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3440 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5083 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: UI spoofing in Blink *************************************************************** Title: Use after free in print preview - CVE-2017-5073 Severity: Medium Fixlet ID: 344101 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3441 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5073 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Use after free in print preview *************************************************************** Title: Heap buffer overflow in Skia - CVE-2017-5077 Severity: Fixlet ID: 344201 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3442 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5077 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Heap buffer overflow in Skia *************************************************************** Title: Insufficient hardening in credit card editor - CVE-2017-5082 Severity: Fixlet ID: 344301 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3443 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5082 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Insufficient hardening in credit card editor *************************************************************** Title: Out of bounds read in V8 - CVE-2017-5071 Severity: Medium Fixlet ID: 344401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3444 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5071 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Out of bounds read in V8 *************************************************************** Title: Use after free in credit card autofill - CVE-2017-5080 Severity: Fixlet ID: 344501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3445 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5080 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Use after free in credit card autofill *************************************************************** Title: Information leak in CSP reporting - CVE-2017-5075 Severity: Fixlet ID: 344601 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3446 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5075 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Information leak in CSP reporting *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11805 Severity: High Fixlet ID: 345401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3454 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11805 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821. *************************************************************** Title: Microsoft Outlook Information Disclosure Vulnerability - CVE-2017-11776 Severity: Medium Fixlet ID: 345901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3459 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11776 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Outlook 2016 allows an attacker to obtain the email content of a user, due to how Outlook 2016 discloses user email content, aka "Microsoft Outlook Information Disclosure Vulnerability." *************************************************************** Title: Skype for Business Elevation of Privilege Vulnerability - CVE-2017-11786 Severity: High Fixlet ID: 346002 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3460 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11786 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Skype for Business in Microsoft Lync 2013 SP1 and Skype for Business 2016 allows an attacker to steal an authentication hash that can be reused elsewhere, due to how Skype for Business handles authentication requests, aka "Skype for Business Elevation of Privilege Vulnerability." *************************************************************** Title: Out-of-bounds write in PPAPI - CVE-2017-5099 Severity: Fixlet ID: 346901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3469 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5099 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Out-of-bounds write in PPAPI. *************************************************************** Title: Use after free in V8 - CVE-2017-5098 Severity: Fixlet ID: 347001 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3470 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5098 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Use after free in V8. *************************************************************** Title: Out-of-bounds read in Skia - CVE-2017-5097 Severity: Fixlet ID: 347101 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3471 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5097 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Out-of-bounds read in Skia. *************************************************************** Title: User information leak via SVG - CVE-2017-5107 Severity: Fixlet ID: 348401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3484 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5107 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: User information leak via SVG. *************************************************************** Title: URL spoofing in OmniBox - CVE-2017-5101 Severity: Fixlet ID: 348501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3485 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5101 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: URL spoofing in OmniBox. *************************************************************** Title: Type confusion in PDFium - CVE-2017-5108 Severity: Fixlet ID: 348601 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3486 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5108 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Type confusion in PDFium. *************************************************************** Title: Uninitialized use in Skia - CVE-2017-5103 Severity: Fixlet ID: 348801 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3488 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5103 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Uninitialized use in Skia. *************************************************************** Title: Uninitialized use in Skia - CVE-2017-5102 Severity: Fixlet ID: 348901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3489 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5102 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Uninitialized use in Skia. *************************************************************** Title: URL spoofing in OmniBox - CVE-2017-5105 Severity: Fixlet ID: 349001 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3490 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5105 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: URL spoofing in OmniBox. *************************************************************** Title: UI spoofing in payments dialog - CVE-2017-5110 Severity: Fixlet ID: 349101 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3491 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5110 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: UI spoofing in browser. *************************************************************** Title: Use after free in Chrome Apps - CVE-2017-5100 Severity: Fixlet ID: 349201 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3492 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5100 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Use after free in Chrome Apps. *************************************************************** Title: URL spoofing in OmniBox - CVE-2017-5106 Severity: Fixlet ID: 349301 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3493 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5106 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: URL spoofing in OmniBox. *************************************************************** Title: UI spoofing in browser - CVE-2017-5109 Severity: Fixlet ID: 349401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3494 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5109 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: UI spoofing in browser. *************************************************************** Title: Use after free in PDFium - CVE-2017-5126 Severity: Fixlet ID: 349501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3495 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5126 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Use after free in PDFium *************************************************************** Title: Out of bounds read in V8 - CVE-2017-5088 Severity: Fixlet ID: 349602 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3496 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5088 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Insufficient validation of untrusted input in V8 in Google Chrome prior to 59.0.3071.104 for Mac, Windows, and Linux, and 59.0.3071.117 for Android, allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. *************************************************************** Title: Incorrect stack manipulation in WebAssembly - CVE-2017-5132 Severity: Fixlet ID: 349701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3497 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5132 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Incorrect stack manipulation in WebAssembly *************************************************************** Title: Use after free in WebAudio - CVE-2017-5129 Severity: Fixlet ID: 349801 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3498 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5129 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Use after free in WebAudio *************************************************************** Title: Domain spoofing in Omnibox - CVE-2017-5089 Severity: Fixlet ID: 349901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3499 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5089 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.104 for Mac allowed a remote attacker to perform domain spoofing via a crafted domain name. *************************************************************** Title: Pointer disclosure in SQLite - CVE-2017-6991 Severity: Medium Fixlet ID: 350001 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3500 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6991 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Pointer disclosure in SQLite *************************************************************** Title: Heap overflow in Skia - CVE-2017-5125 Severity: Fixlet ID: 350101 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3501 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5125 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Heap overflow in Skia *************************************************************** Title: UXSS with MHTML - CVE-2017-5124 Severity: Fixlet ID: 350201 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3502 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5124 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: UXSS with MHTML *************************************************************** Title: Use after free in PDFium - CVE-2017-5127 Severity: Fixlet ID: 350301 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3503 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5127 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Use after free in PDFium *************************************************************** Title: Heap overflow in WebGL - CVE-2017-5128 Severity: Fixlet ID: 350401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3504 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5128 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Heap overflow in WebGL *************************************************************** Title: Use-after-free while deleting attached editor DOM node - CVE-2017-7809 Severity: Fixlet ID: 350501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3505 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7809 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: A use-after-free vulnerability can occur when an editor DOM node is deleted prematurely during tree traversal while still bound to the document. This results in a potentially exploitable crash. *************************************************************** Title: Domain hijacking through AppCache fallback - CVE-2017-7807 Severity: Fixlet ID: 350601 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3506 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7807 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: A mechanism that uses AppCache to hijack a URL in a domain using fallback by serving the files from a sub-path on the domain. This has been addressed by requiring fallback files be inside the manifest directory. *************************************************************** Title: Use-after-free with marquee during window resizing - CVE-2017-7801 Severity: Fixlet ID: 350701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3507 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7801 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: A use-after-free vulnerability can occur while re-computing layout for a marquee element during window resizing where the updated style object is freed while still in use. This results in a potentially exploitable crash. *************************************************************** Title: Use-after-free resizing image elements - CVE-2017-7802 Severity: Fixlet ID: 350802 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3508 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7802 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an image element. If these elements have been freed due to a lack of strong references, a potentially exploitable crash may occur when the freed elements are accessed. *************************************************************** Title: Memory protection bypass through WindowsDllDetourPatcher - CVE-2017-7804 Severity: Fixlet ID: 350901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3509 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7804 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The destructor function for the WindowsDllDetourPatcher class can be re-purposed by malicious code in concert with another vulnerability to write arbitrary data to an attacker controlled location in memory. This can be used to bypass existing memory protections in this situation. *************************************************************** Title: CSP containing 'sandbox' improperly applied - CVE-2017-7803 Severity: Fixlet ID: 351001 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3510 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7803 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: When a page?s content security policy (CSP) header contains a sandbox directive, other directives are ignored. This results in the incorrect enforcement of CSP. *************************************************************** Title: Heap overflow in libxml2 - CVE-2017-5130 Severity: Fixlet ID: 351601 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3516 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5130 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Heap overflow in libxml2. *************************************************************** Title: Content security bypass - CVE-2017-15387 Severity: Fixlet ID: 351701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3517 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15387 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Content security bypass. *************************************************************** Title: URL spoofing in OmniBox - CVE-2017-15389 Severity: Fixlet ID: 351801 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3518 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15389 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: URL spoofing in OmniBox. *************************************************************** Title: UI spoofing in Blink - CVE-2017-15386 Severity: Fixlet ID: 351901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3519 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15386 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: UI spoofing in Blink. *************************************************************** Title: Out of bounds write in Skia - CVE-2017-5133 Severity: Fixlet ID: 352001 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3520 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5133 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Out of bounds write in Skia. *************************************************************** Title: Out of bounds read in Skia - CVE-2017-15388 Severity: Fixlet ID: 352101 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3521 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15388 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Out of bounds read in Skia. *************************************************************** Title: Out of bounds write in Skia - CVE-2017-5131 Severity: Fixlet ID: 352201 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3522 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5131 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Out of bounds write in Skia. *************************************************************** Title: Inappropriate javascript execution on WebUI pages - CVE-2017-5085 Severity: Fixlet ID: 352601 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3526 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5085 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Inappropriate implementation in Bookmarks in Google Chrome prior to 59 for iOS allowed a remote attacker who convinced the user to perform certain operations to run JavaScript on chrome:// pages via a crafted bookmark. *************************************************************** Title: Address spoofing in Omnibox - CVE-2017-5086 Severity: Fixlet ID: 354301 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3543 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5086 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Windows and Mac allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name. *************************************************************** Title: Incorrect handling of picture ID in WebRTC - CVE-2017-5068 Severity: Medium Fixlet ID: 354402 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3544 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5068 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Incorrect handling of picture ID in WebRTC in Google Chrome prior to 58.0.3029.96 for Mac, Windows, and Linux allowed a remote attacker to trigger a race condition via a crafted HTML page. *************************************************************** Title: An out-of-bounds read in V8 - CVE-2017-5053 Severity: Medium Fixlet ID: 354501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3545 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5053 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: An out-of-bounds read in V8 in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page, related to Array.prototype.indexOf. *************************************************************** Title: An incorrect assumption about block structure in Blink - CVE-2017-5052 Severity: Medium Fixlet ID: 354601 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3546 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5052 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: An incorrect assumption about block structure in Blink in Google Chrome prior to 57.0.2987.133 for Mac, Windows, and Linux, and 57.0.2987.132 for Android, allowed a remote attacker to potentially exploit memory corruption via a crafted HTML page that triggers improper casting. *************************************************************** Title: An out-of-bounds read in V8 - CVE-2017-5054 Severity: Medium Fixlet ID: 354701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3547 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5054 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: An out-of-bounds read in V8 in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to obtain heap memory contents via a crafted HTML page. *************************************************************** Title: A use after free in printing - CVE-2017-5055 Severity: High Fixlet ID: 354801 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3548 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5055 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: A use after free in printing in Google Chrome prior to 57.0.2987.133 for Linux and Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. *************************************************************** Title: A use after free in Blink - CVE-2017-5056 Severity: Medium Fixlet ID: 354901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3549 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5056 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: A use after free in Blink in Google Chrome prior to 57.0.2987.133 for Linux, Windows, and Mac, and 57.0.2987.132 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. *************************************************************** Title: Blink in Google Chrome - CVE-2017-5027 Severity: Medium Fixlet ID: 355001 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3550 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5027 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.0.2924.87 for Android, failed to properly enforce unsafe-inline content security policy, which allowed a remote attacker to bypass content security policy via a crafted HTML page. *************************************************************** Title: Vulnerability in the MySQL Server component of Oracle MySQL - CVE-2017-10365 Severity: Medium Fixlet ID: 355301 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3553 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10365 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. *************************************************************** Title: Vulnerability in the MySQL Server component of Oracle MySQL - CVE-2017-10284 Severity: Medium Fixlet ID: 355401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3554 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10284 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. *************************************************************** Title: Vulnerability in the MySQL Server component of Oracle MySQL - CVE-2017-10296 Severity: Medium Fixlet ID: 355501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3555 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10296 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. *************************************************************** Title: Extension limitation bypass in Extensions - CVE-2017-15391 Severity: Fixlet ID: 355602 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3556 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15391 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Extension limitation bypass in Extensions. *************************************************************** Title: Null pointer dereference in ImageCapture - CVE-2017-15395 Severity: Fixlet ID: 355701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3557 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15395 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Null pointer dereference in ImageCapture. *************************************************************** Title: URL spoofing in extensions UI - CVE-2017-15394 Severity: Fixlet ID: 355801 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3558 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15394 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: URL spoofing in extensions UI. *************************************************************** Title: URL spoofing in OmniBox - CVE-2017-15390 Severity: Fixlet ID: 355901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3559 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15390 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: URL spoofing in OmniBox. *************************************************************** Title: Referrer leak in Devtools - CVE-2017-15393 Severity: Fixlet ID: 356001 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3560 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15393 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Referrer leak in Devtools. *************************************************************** Title: Incorrect registry key handling in PlatformIntegration - CVE-2017-15392 Severity: Fixlet ID: 356101 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3561 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15392 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Incorrect registry key handling in PlatformIntegration. *************************************************************** Title: Vulnerability in Java SE: 6u161, 7u151, 8u144; Java SE Embedded: 8u144 - CVE-2016-9841 Severity: High Fixlet ID: 357302 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3573 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9841 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic. *************************************************************** Title: Vulnerability in the MySQL Server component of Oracle MySQL - CVE-2017-10167 Severity: Medium Fixlet ID: 357501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3575 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10167 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. *************************************************************** Title: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: FTS) - CVE-2017-10311 Severity: Medium Fixlet ID: 357601 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3576 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10311 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. *************************************************************** Title: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: FTS) - CVE-2017-10320 Severity: Medium Fixlet ID: 357702 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3577 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10320 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. *************************************************************** Title: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Group Replication GCS) - CVE-2017-10313 Severity: Medium Fixlet ID: 357801 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3578 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10313 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. *************************************************************** Title: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication) - CVE-2017-10165 Severity: Medium Fixlet ID: 357901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3579 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10165 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. From winvulns-announcements at bigmail.bigfix.com Thu Nov 30 05:21:27 2017 From: winvulns-announcements at bigmail.bigfix.com (Notification of New Vulnerabilties to Windows Systems Fixlet Messages) Date: Thu, 30 Nov 2017 05:21:27 -0800 Subject: [Winvulns-announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Vulnerabilities to Windows Systems' Message-ID: Fixlet Site - 'Vulnerabilities to Windows Systems' Current Version: 571 Published: Wed, 29 Nov 2017 23:38:18 GMT New Fixlets: ============ *************************************************************** Title: Spoofing following page navigation with data: protocol and modal alerts - CVE-2017-7791 Severity: Fixlet ID: 347701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3477 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7791 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: On pages containing an iframe, the data: protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. *************************************************************** Title: XUL injection in the style editor in devtools - CVE-2017-7798 Severity: Fixlet ID: 347801 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3478 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7798 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Developer Tools feature suffers from a XUL injection vulnerability due to improper sanitization of the web page source code. In the worst case, this could allow arbitrary code execution when opening a malicious page with the style editor tool. *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11846 Severity: Fixlet ID: 361301 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3613 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11846 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873. *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11866 Severity: Fixlet ID: 361401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3614 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11866 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: ChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873. *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11871 Severity: Fixlet ID: 361501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3615 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11871 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: ChakraCore and Microsoft Edge in Windows 10 1703, 1709, and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, and CVE-2017-11873. *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11843 Severity: Fixlet ID: 361601 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3616 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11843 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873. *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11836 Severity: Fixlet ID: 361701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3617 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11836 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: ChakraCore, and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to take control of an affected system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873. *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11841 Severity: Fixlet ID: 361801 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3618 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11841 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: ChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873. *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11869 Severity: Fixlet ID: 361901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3619 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11869 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how Microsoft browsers handle objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873. *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11838 Severity: Fixlet ID: 362001 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3620 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11838 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873. *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11839 Severity: Fixlet ID: 362101 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3621 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11839 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to take control of an affected system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873. *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11840 Severity: Fixlet ID: 362202 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3622 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11840 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: ChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873. *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11870 Severity: Fixlet ID: 362301 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3623 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11870 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: ChakraCore and Microsoft Edge in Windows 10 1703, 1709, and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11871, and CVE-2017-11873. *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11873 Severity: Fixlet ID: 362401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3624 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11873 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: ChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, and CVE-2017-11871. *************************************************************** Title: Scripting Engine Information Disclosure Vulnerability - CVE-2017-11834 Severity: Fixlet ID: 362501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3625 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11834 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to obtain information to further compromise the user's system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11791. *************************************************************** Title: Scripting Engine Memory Corruption Vulnerability - CVE-2017-11837 Severity: Fixlet ID: 362601 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3626 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11837 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873. *************************************************************** Title: Microsoft Edge Security Feature Bypass Vulnerability - CVE-2017-11874 Severity: Fixlet ID: 362701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3627 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11874 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Edge in Microsoft Windows 10 1703, 1709, Windows Server, version 1709, and ChakraCore allows an attacker to bypass Control Flow Guard (CFG) to run arbitrary code on a target system, due to how Microsoft Edge handles accessing memory in code compiled by the Edge Just-In-Time (JIT) compiler, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-11863 and CVE-2017-11872. *************************************************************** Title: Microsoft Edge Information Disclosure Vulnerability - CVE-2017-11844 Severity: Fixlet ID: 362801 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3628 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11844 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Edge in Microsoft Windows 10 1703, 1709 and Windows Server, version 1709 allows an attacker to obtain information to further compromise the user's system, due to how Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11803 and CVE-2017-11833. *************************************************************** Title: Microsoft Edge Memory Corruption Vulnerability - CVE-2017-11845 Severity: Fixlet ID: 362901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3629 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11845 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how Microsoft Edge handles objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability". *************************************************************** Title: Microsoft Edge Security Feature Bypass Vulnerability - CVE-2017-11872 Severity: Fixlet ID: 363001 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3630 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11872 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows an attacker to force the browser to send data that would otherwise be restricted to a destination website of the attacker's choice, due to how Microsoft Edge handles redirect requests, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-11863 and CVE-2017-11874. *************************************************************** Title: Microsoft Edge Information Disclosure Vulnerability - CVE-2017-11803 Severity: Fixlet ID: 363101 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3631 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11803 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Edge in Microsoft Windows 10 1703, 1709 and Windows Server, version 1709 allows an attacker to obtain information to further compromise the user's system, due to how Microsoft Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11833 and CVE-2017-11844. *************************************************************** Title: Microsoft Edge Security Feature Bypass Vulnerability - CVE-2017-11863 Severity: Fixlet ID: 363201 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3632 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11863 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to trick a user into loading a page containing malicious content, due to how the Edge Content Security Policy (CSP) validates documents, aka "Microsoft Edge Security Feature Bypass Vulnerability". This CVE ID is unique from CVE-2017-11872 and CVE-2017-11874. *************************************************************** Title: Microsoft Edge Information Disclosure Vulnerability - CVE-2017-11833 Severity: Fixlet ID: 363301 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3633 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11833 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to determine the origin of all webpages in the affected browser, due to how Microsoft Edge handles cross-origin requests, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11803 and CVE-2017-11844. *************************************************************** Title: Vulnerability in Java SE: 7u151, 8u144, 9; Java SE Embedded: 8u144; JRockit: R28.3.15 - CVE-2016-10165 Severity: Medium Fixlet ID: 363601 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3636 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-10165 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read. *************************************************************** Title: Stack overflow in V8 - CVE-2017-15396 Severity: Fixlet ID: 363901 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3639 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-15396 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Stack overflow in V8. *************************************************************** Title: Device Guard Security Feature Bypass Vulnerability - CVE-2017-11830 Severity: Fixlet ID: 364001 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3640 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11830 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Device Guard in Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to make an unsigned file appear to be signed, due to a security feature bypass, aka "Device Guard Security Feature Bypass Vulnerability". *************************************************************** Title: Windows EOT Font Engine Information Disclosure Vulnerability - CVE-2017-11835 Severity: Fixlet ID: 364101 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3641 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11835 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Microsoft graphics in Windows 7 SP1 and Windows Server 2008 SP2 and R2 SP1 allows an attacker to potentially read data that was not intended to be disclosed due to the way that the Microsoft Windows Embedded OpenType (EOT) font engine parses specially crafted embedded fonts, aka "Windows EOT Font Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11832. *************************************************************** Title: Windows Information Disclosure Vulnerability - CVE-2017-11831 Severity: Fixlet ID: 364201 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3642 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11831 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to log on to an affected system, and run a specially crafted application that can compromise the user's system due to how the Windows kernel initializes memory, aka "Windows Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11880. *************************************************************** Title: Windows EOT Font Engine Information Disclosure Vulnerability - CVE-2017-11832 Severity: Fixlet ID: 364301 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3643 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11832 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: The Microsoft Windows embedded OpenType (EOT) font engine in Windows 7 SP1, Windows Server 2008 SP2 and 2008 R2 SP1, and Windows Server 2012 allows an attacker to potentially read data that was not intended to be disclosed, due to the way that the Microsoft Windows EOT font engine parses specially crafted embedded fonts, aka "Windows EOT Font Engine Information Disclosure Vulnerability." This CVE ID is unique from CVE-2017-11835. *************************************************************** Title: Windows Information Disclosure Vulnerability - CVE-2017-11880 Severity: Fixlet ID: 364401 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3644 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11880 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an attacker to run a specially crafted application and obtain information to further compromise the user's system due to the Windows kernel improperly initializing objects in memory, aka "Windows Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11831. *************************************************************** Title: Internet Explorer Information Disclosure Vulnerability - CVE-2017-11848 Severity: Fixlet ID: 364501 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3645 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11848 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Internet Explorer in Microsoft Microsoft Windows 7 SP1, Windows Server 2008 SP2, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to detect the navigation of the user leaving a maliciously crafted page, due to how page content is handled by Internet Explorer, aka "Internet Explorer Information Disclosure Vulnerability". *************************************************************** Title: Internet Explorer Memory Corruption Vulnerability - CVE-2017-11855 Severity: Fixlet ID: 364601 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3646 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11855 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11856. *************************************************************** Title: Internet Explorer Memory Corruption Vulnerability - CVE-2017-11856 Severity: Fixlet ID: 364701 Fixlet Link: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.cisecurity%3Adef%3A3647 Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11856 Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo Fixlet Description: Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11855.