Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Published: 2017-03-17
Updated: 2019-10-03
Summary
A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Exploit-Db
description | Microsoft Edge 38.14393.0.0 - JavaScript Engine Use-After-Free. CVE-2017-0070. Dos exploit for Windows platform |
file | exploits/windows/dos/41623.html |
id | EDB-ID:41623 |
last seen | 2017-03-16 |
modified | 2017-03-16 |
platform | windows |
port | |
published | 2017-03-16 |
reporter | Exploit-DB |
source | https://www.exploit-db.com/download/41623/ |
title | Microsoft Edge 38.14393.0.0 - JavaScript Engine Use-After-Free |
type | dos |
Msbulletin
bulletin_id | MS17-007 |
bulletin_url | |
date | 2017-03-14T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 4013071 |
knowledgebase_url | |
severity | Critical |
title | Cumulative Security Update for Microsoft Edge |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS17-007.NASL |
description | The version of Microsoft Edge installed on the remote Windows host is missing Cumulative Security Update 4013071. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities. An unauthenticated, remote attacker can exploit these vulnerabilities by convincing a user to visit a specially crafted website, resulting in the execution of arbitrary code in the context of the current user. Note that in order to be fully protected from CVE-2017-0071, Microsoft recommends the July 2017 security updates to be installed. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 97730 |
published | 2017-03-14 |
reporter | This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/97730 |
title | MS17-007: Cumulative Security Update for Microsoft Edge (4013071) |
Seebug
bulletinFamily | exploit |
description | Content source:https://bugs. chromium. org/p/project-zero/issues/detail? id=1043 I noticed that some javascript getters behave what. My test code: `` var whitelist = ["closed", "document", "frames", "length", "location", "opener", "parent", "self", "top", "window"]; var f = document. createElement("iframe"); f. onload = () => { f. onload = null; for (var x in window) { if (whitelist. indexOf(x) != -1) continue; try { window.__ lookupGetter__(x). call(f. contentWindow); log(x); } catch (e) { } } }; f. src = "https://abc.xyz/"; document. body. appendChild(f); `` And after some plays, finally reached an UAF condition. The PoC is attached. RIP will jump into the freed JIT code. Tested on Microsoft Edge 38.14393.0.0. |
id | SSV:92797 |
last seen | 2017-11-19 |
modified | 2017-03-20 |
published | 2017-03-20 |
reporter | Anonymous |
source | https://www.seebug.org/vuldb/ssvid-92797 |
title | Microsoft Edge 38.14393.0.0 - JavaScript Engine Use-After-Free (CVE-2017-0070) |