Описание
Internet Explorer Memory Corruption Vulnerability
FAQ
How could an attacker exploit the vulnerability?
An attacker could host a specially crafted website designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action, typically by an enticement in an email or instant message, or by getting the user to open an attachment sent through email.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Internet Explorer 9 on Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
| Internet Explorer 9 on Windows Server 2008 for x64-based Systems Service Pack 2 | ||
| Internet Explorer 11 on Windows 7 for 32-bit Systems Service Pack 1 | ||
| Internet Explorer 11 on Windows 7 for x64-based Systems Service Pack 1 | ||
| Internet Explorer 11 on Windows 8.1 for 32-bit systems | ||
| Internet Explorer 11 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
| Internet Explorer 11 on Windows Server 2012 | ||
| Internet Explorer 11 on Windows 10 Version 1803 for 32-bit Systems | ||
| Internet Explorer 11 on Windows 10 Version 1803 for x64-based Systems | ||
| Internet Explorer 11 on Windows 10 Version 1803 for ARM64-based Systems |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
DOS
EPSS
8.8 High
CVSS3
Связанные уязвимости
Internet Explorer Memory Corruption Vulnerability
Уязвимость браузера Internet Explorer и Microsoft Edge, связанная с повторным освобождением памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
EPSS
8.8 High
CVSS3