Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2017-11846 | First vendor Publication | 2017-11-14 |
Vendor | Cve | Last vendor Modification | 2017-12-01 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 7.5 | ||
Base Score | 7.5 | Environmental Score | 7.5 |
impact SubScore | 5.9 | Temporal Score | 7.5 |
Exploitabality Sub Score | 1.6 | ||
Attack Vector | Network | Attack Complexity | High |
Privileges Required | None | User Interaction | Required |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
ChakraCore and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11837, CVE-2017-11838, CVE-2017-11839, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11858, CVE-2017-11859, CVE-2017-11861, CVE-2017-11862, CVE-2017-11866, CVE-2017-11869, CVE-2017-11870, CVE-2017-11871, and CVE-2017-11873. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11846 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 | |
Application | 1 |
Snort® IPS/IDS
Date | Description |
---|---|
2017-12-15 | Microsoft Edge heap overflow attempt RuleID : 44846 - Revision : 2 - Type : BROWSER-IE |
2017-12-15 | Microsoft Edge heap overflow attempt RuleID : 44845 - Revision : 2 - Type : BROWSER-IE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-11-30 | Name : The Internet Explorer installation on the remote host is affected by multiple... File : smb_nt_ms17_nov_internet_explorer.nasl - Type : ACT_GATHER_INFO |
2017-11-14 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_nov_4048952.nasl - Type : ACT_GATHER_INFO |
2017-11-14 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_nov_4048953.nasl - Type : ACT_GATHER_INFO |
2017-11-14 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_nov_4048954.nasl - Type : ACT_GATHER_INFO |
2017-11-14 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_nov_4048955.nasl - Type : ACT_GATHER_INFO |
2017-11-14 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_nov_4048956.nasl - Type : ACT_GATHER_INFO |
2017-11-14 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_nov_4048957.nasl - Type : ACT_GATHER_INFO |
2017-11-14 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_nov_4048958.nasl - Type : ACT_GATHER_INFO |
2017-11-14 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_nov_4048959.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2020-05-23 00:55:19 |
|
2017-12-01 21:22:12 |
|
2017-12-01 13:23:46 |
|
2017-11-16 09:21:50 |
|
2017-11-15 13:25:31 |
|
2017-11-15 09:23:54 |
|