CVE-2017-8609
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Microsoft Internet Explorer in Microsoft Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user when the JavaScript engine fails to render when handling objects in memory in Microsoft Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8596, CVE-2017-8610, CVE-2017-8618, CVE-2017-8619, CVE-2017-8595, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, and CVE-2017-8609.
Microsoft Internet Explorer en Microsoft Windows 10 versiones Gold, 1511, 1607 y 1703, y Windows Server 2016, permiten a un atacante ejecutar código arbitrario en el contexto del usuario actual cuando el motor de JavaScript no renderiza al manejar objetos en memoria en Microsoft Internet Explorer, también se conoce como "Scripting Engine Memory Corruption Vulnerability". Este CVE es diferente a los CVE-2017-8596, CVE-2017-8610, CVE-2017-8618, CVE-2017-8619, CVE-2017-8595, CVE-2017-8601, CVE-2017-8603, CVE-2017-8604, CVE-2017-8605, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608 y CVE-2017-8609.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-05-03 CVE Reserved
- 2017-07-11 CVE Published
- 2024-09-17 CVE Updated
- 2024-11-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/99418 | Third Party Advisory | |
http://www.securitytracker.com/id/1038849 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-8609 | 2017-07-13 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | Edge Search vendor "Microsoft" for product "Edge" | * | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows 10 Search vendor "Microsoft" for product "Windows 10" | - | - |
Safe
|
Microsoft Search vendor "Microsoft" | Edge Search vendor "Microsoft" for product "Edge" | * | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows 10 Search vendor "Microsoft" for product "Windows 10" | 1511 Search vendor "Microsoft" for product "Windows 10" and version "1511" | - |
Safe
|
Microsoft Search vendor "Microsoft" | Edge Search vendor "Microsoft" for product "Edge" | * | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows 10 Search vendor "Microsoft" for product "Windows 10" | 1607 Search vendor "Microsoft" for product "Windows 10" and version "1607" | - |
Safe
|
Microsoft Search vendor "Microsoft" | Edge Search vendor "Microsoft" for product "Edge" | * | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows 10 Search vendor "Microsoft" for product "Windows 10" | 1703 Search vendor "Microsoft" for product "Windows 10" and version "1703" | - |
Safe
|
Microsoft Search vendor "Microsoft" | Edge Search vendor "Microsoft" for product "Edge" | * | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Server 2016 Search vendor "Microsoft" for product "Windows Server 2016" | * | - |
Safe
|