CNVD-2018-18005

Vulnerability from cnvd - Published: 2018-09-07
VLAI Severity ?
Title
Microsoft Internet Explorer远程代码执行漏洞(CNVD-2018-18005)
Description
Microsoft Windows Server 2012等都是美国微软(Microsoft)公司发布的一系列操作系统。Internet Explorer(IE)是其中的一款Windows操作系统附带的Web浏览器。 Microsoft IE 9、10和11中脚本引擎处理内存对象的方式存在远程代码执行漏洞。远程攻击者可利用该漏洞在当前用户的上下文中执行任意代码,破坏内存。
Severity
Patch Name
Microsoft Internet Explorer远程代码执行漏洞(CNVD-2018-18005)的补丁
Patch Description
Microsoft Windows Server 2012等都是美国微软(Microsoft)公司发布的一系列操作系统。Internet Explorer(IE)是其中的一款Windows操作系统附带的Web浏览器。 Microsoft IE 9、10和11中脚本引擎处理内存对象的方式存在远程代码执行漏洞。远程攻击者可利用该漏洞在当前用户的上下文中执行任意代码,破坏内存。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8353

Reference
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8353 https://www.exploit-db.com/exploits/45279/ https://www.securityfocus.com/bid/105034
Impacted products
Name
['Microsoft Internet Explorer(Windows Server 2008 SP2) 9', 'Microsoft Internet Explorer(Windows Server 2012 R2) 11', 'Microsoft Internet Explorer(Windows Server 2008 R2 SP1) 11', 'Microsoft Internet Explorer(Windows RT 8.1) 11', 'Microsoft Internet Explorer(Windows 8.1) 11', 'Microsoft Internet Explorer(Windows 7 SP1) 11', 'Microsoft Internet Explorer (Windows 10版本1703) 11', 'Microsoft Internet Explorer (Windows 10版本1607) 11', 'Microsoft Internet Explorer (Windows 10) 11', 'Microsoft Internet Explorer (Windows 10版本1709) 11', 'Microsoft Internet Explorer (Windows 10版本1803) 11', 'Microsoft Internet Explorer (Windows Server 2016) 11', 'Microsoft Internet Explorer(Microsoft Windows Server 2012) 10']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "105034"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2018-8353"
    }
  },
  "description": "Microsoft Windows Server 2012\u7b49\u90fd\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u53d1\u5e03\u7684\u4e00\u7cfb\u5217\u64cd\u4f5c\u7cfb\u7edf\u3002Internet Explorer\uff08IE\uff09\u662f\u5176\u4e2d\u7684\u4e00\u6b3eWindows\u64cd\u4f5c\u7cfb\u7edf\u9644\u5e26\u7684Web\u6d4f\u89c8\u5668\u3002\r\n\r\nMicrosoft IE 9\u300110\u548c11\u4e2d\u811a\u672c\u5f15\u64ce\u5904\u7406\u5185\u5b58\u5bf9\u8c61\u7684\u65b9\u5f0f\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u5f53\u524d\u7528\u6237\u7684\u4e0a\u4e0b\u6587\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff0c\u7834\u574f\u5185\u5b58\u3002",
  "discovererName": "Ivan Fratric of Google Project Zero",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8353",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2018-18005",
  "openTime": "2018-09-07",
  "patchDescription": "Microsoft Windows Server 2012\u7b49\u90fd\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u53d1\u5e03\u7684\u4e00\u7cfb\u5217\u64cd\u4f5c\u7cfb\u7edf\u3002Internet Explorer\uff08IE\uff09\u662f\u5176\u4e2d\u7684\u4e00\u6b3eWindows\u64cd\u4f5c\u7cfb\u7edf\u9644\u5e26\u7684Web\u6d4f\u89c8\u5668\u3002\r\n\r\nMicrosoft IE 9\u300110\u548c11\u4e2d\u811a\u672c\u5f15\u64ce\u5904\u7406\u5185\u5b58\u5bf9\u8c61\u7684\u65b9\u5f0f\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u5f53\u524d\u7528\u6237\u7684\u4e0a\u4e0b\u6587\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff0c\u7834\u574f\u5185\u5b58\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Microsoft Internet Explorer\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2018-18005\uff09\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Microsoft Internet Explorer\uff08Windows Server 2008 SP2\uff09 9",
      "Microsoft Internet Explorer\uff08Windows Server 2012 R2\uff09 11",
      "Microsoft Internet Explorer\uff08Windows Server 2008 R2 SP1\uff09 11",
      "Microsoft Internet Explorer\uff08Windows RT 8.1\uff09 11",
      "Microsoft Internet Explorer\uff08Windows 8.1\uff09 11",
      "Microsoft Internet Explorer\uff08Windows 7 SP1\uff09 11",
      "Microsoft Internet Explorer \uff08Windows 10\u7248\u672c1703\uff09 11",
      "Microsoft Internet Explorer \uff08Windows 10\u7248\u672c1607\uff09 11",
      "Microsoft Internet Explorer \uff08Windows 10\uff09 11",
      "Microsoft Internet Explorer \uff08Windows 10\u7248\u672c1709\uff09 11",
      "Microsoft Internet Explorer \uff08Windows 10\u7248\u672c1803\uff09 11",
      "Microsoft Internet Explorer \uff08Windows Server 2016\uff09 11",
      "Microsoft Internet Explorer\uff08Microsoft Windows Server 2012\uff09 10"
    ]
  },
  "referenceLink": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8353\r\nhttps://www.exploit-db.com/exploits/45279/\r\nhttps://www.securityfocus.com/bid/105034",
  "serverity": "\u9ad8",
  "submitTime": "2018-08-15",
  "title": "Microsoft Internet Explorer\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2018-18005\uff09"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…