CVE-2017-8636

Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
References
Link Resource
http://www.securityfocus.com/bid/100056 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039094 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039095 Third Party Advisory VDB Entry
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8636 Patch Vendor Advisory
https://www.exploit-db.com/exploits/42466/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/42467/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/42468/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/42478/ Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/100056 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039094 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039095 Third Party Advisory VDB Entry
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8636 Patch Vendor Advisory
https://www.exploit-db.com/exploits/42466/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/42467/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/42468/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/42478/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:34

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/100056 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100056 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039094 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039094 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039095 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039095 - Third Party Advisory, VDB Entry
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8636 - Patch, Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8636 - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/42466/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/42466/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/42467/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/42467/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/42468/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/42468/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/42478/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/42478/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2017-08-08 21:29

Updated : 2024-11-21 03:34


NVD link : CVE-2017-8636

Mitre link : CVE-2017-8636

CVE.ORG link : CVE-2017-8636


JSON object : View

Products Affected

microsoft

  • windows_server_2008
  • windows_7
  • windows_8.1
  • edge
  • windows_rt_8.1
  • windows_server_2016
  • windows_server_2012
  • windows_10
  • internet_explorer
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer