Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2017-11767

Опубликовано: 14 сент. 2017
Источник: msrc
EPSS Средний

Описание

Scripting Engine Memory Corruption Vulnerability

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.

If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

The security update addresses the vulnerability by modifying how the ChakraCore scripting engine handles objects in memory.

Обновления

ПродуктСтатьяОбновление
ChakraCore

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation More Likely

Older Software Release

N/A

EPSS

Процентиль: 95%
0.17164
Средний

Связанные уязвимости

CVSS3: 9.8
nvd
больше 7 лет назад

ChakraCore allows an attacker to gain the same user rights as the current user, due to the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability".

CVSS3: 9.8
github
около 3 лет назад

ChakraCore vulnerable to privilege escalation

CVSS3: 9.8
fstec
почти 8 лет назад

Уязвимость ядра JavaScript ChakraCore, связанная с некорректной обработкой объектов в памяти, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 95%
0.17164
Средний