CVE-2017-8636
Description
Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Affected products
5cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
- Microsoft Corporation/Microsoft Scripting Enginev5Range: Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8636nvdPatchVendor Advisory
- www.exploit-db.com/exploits/42466/nvdExploitThird Party AdvisoryVDB Entry
- www.exploit-db.com/exploits/42467/nvdExploitThird Party AdvisoryVDB Entry
- www.exploit-db.com/exploits/42468/nvdExploitThird Party AdvisoryVDB Entry
- www.exploit-db.com/exploits/42478/nvdExploitThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/100056nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1039094nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1039095nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.