7.6
CVSSv2

CVE-2017-11802

Published: 13/10/2017 Updated: 20/10/2017
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 765
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an malicious user to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11801, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft chakracore

microsoft edge

Exploits

/* Source: bugschromiumorg/p/project-zero/issues/detail?id=1334 The "Stringprototypereplace" method can be inlined in the JIT process So in the method, all the calls which may break the JIT assumptions must be invoked with updating "ImplicitCallFlags" But "RegexHelper::StringReplace" calls the replace function without updating the fl ...
The "Stringprototypereplace" method can be inlined in the JIT process So in the method, all the calls which may break the JIT assumptions must be invoked with updating "ImplicitCallFlags" But "RegexHelper::StringReplace" calls the replace function without updating the flag Therefore it fails to detect if a user function was called ...