Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Multiple vulnerabilities have been reported in Microsoft Edge, which can be exploited by malicious people to compromise a vulnerable system.
IMPACT: CRITICAL
PUBLISH DATE: 13-DEC-2018
OVERVIEW
An arbitrary code subsequently executes when handling objects in memory. This can be exploited to corrupt memory. This error is related to chakra scripting engine. Updates are available.
ANALYSIS
Five remote code execution vulnerabilities have been discovered in Microsoft Edge. Identified as CVE-2018-8624, CVE-2018-8618, CVE-2018-8617, CVE-2018-8629 and CVE-2018-8583, each one of these vulnerabilities are unique from the others.
The flaw exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka “Chakra Scripting Engine Memory Corruption Vulnerability.”
This affects Microsoft Edge, ChakraCore.
AFFECTED PRODUCTS
Microsoft Edge
UPDATES
Apply relevant updates as given below.
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471327
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471327
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471332
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471332
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471332
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471329
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471324
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471329
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471324
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471324
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471329
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471321
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471321
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471323
https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4471323
Note: Security updates for Windows 10 and Windows Server 2016 are available via e.g. Windows Update or Windows Update Catalog only.
If you think you’re the victim of a cyber-attack, immediately send an email to soc@rewterz.com for a quick response