Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2017.0069 Microsoft Internet Explorer Updates 10 May 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Microsoft Internet Explorer Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Provide Misleading Information -- Remote with User Interaction Unauthorised Access -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2017-0238 CVE-2017-0231 CVE-2017-0228 CVE-2017-0226 CVE-2017-0222 CVE-2017-0064 Member content until: Friday, June 9 2017 OVERVIEW Microsoft has released its monthly security patch update for the month of May 2017 for Internet Explorer. [1] This update resolves 6 vulnerabilities across the following products: Internet Explorer 9 on Windows Server 2008 for 32-bit Systems Service Pack 2 Internet Explorer 9 on Windows Server 2008 for x64-based Systems Service Pack 2 Internet Explorer 10 on Windows Server 2012 Internet Explorer 11 on Windows 7 for 32-bit Systems Service Pack 1 Internet Explorer 11 on Windows 7 for x64-based Systems Service Pack 1 Internet Explorer 11 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 Internet Explorer 11 on Windows 8.1 for 32-bit systems Internet Explorer 11 on Windows 8.1 for x64-based systems Internet Explorer 11 on Windows Server 2012 R2 Internet Explorer 11 on Windows RT 8.1 Internet Explorer 11 on Windows 10 for 32-bit Systems Internet Explorer 11 on Windows 10 for x64-based Systems Internet Explorer 11 on Windows 10 Version 1511 for x64-based Systems Internet Explorer 11 on Windows 10 Version 1511 for 32-bit Systems Internet Explorer 11 on Windows Server 2016 Internet Explorer 11 on Windows 10 Version 1607 for 32-bit Systems Internet Explorer 11 on Windows 10 Version 1607 for x64-based Systems Internet Explorer 11 on Windows 10 Version 1703 for 32-bit Systems Internet Explorer 11 on Windows 10 Version 1703 for x64-based Systems IMPACT Microsoft has given the following details regarding these vulnerabilities: "CVE-2017-0064 - Internet Explorer Security Feature Bypass Vulnerability 2.40 - CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C CVE-2017-0222 - Internet Explorer Memory Corruption Vulnerability 7.10 - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C CVE-2017-0226 - Microsoft Internet Explorer Memory Corruption Vulnerability 7.50 - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C CVE-2017-0228 - Scripting Engine Memory Corruption Vulnerability 7.50 - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C CVE-2017-0231 - Microsoft Browser Spoofing Vulnerability 4.30 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C CVE-2017-0238 - Scripting Engine Memory Corruption Vulnerability 6.40 - CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C"[1] MITIGATION Microsoft recommends updating the software with the version made available on the Microsoft Update Cataloge for the following Knowledge Base articles: KB4019264, KB4019473, KB4019215, KB4019472, KB4019474, KB4016871 KB4019214, KB4018271. [1] REFERENCES [1] Security Update Guide https://portal.msrc.microsoft.com/en-us/security-guidance AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWRLGA4x+lLeg9Ub1AQhDsQ//fbfOoPKiq86KlOPUnP2w5exsb/r2qNSm Cz78cPdEVt+uqkZAJGdEkAGvyshS5eSc26jVYf+v3VA2YHssIBj4yq/v4E/+qUfT /naTqymolFiA7GtD+NqOZTqeG5NjZkqo3wfcFV60If4M0Li2PihHK4cls4m3rdzv CCf8TTox2KkGUTj/KLxOBK8wfxq/D1RnSUZZc6oB4OxSEWTixSgROW2elUljnrYD 05hn7NYQdALPABwH0p/AWjpCuHhTU0qoMqQuvuzztDcEH/skg3N9BOUPwgb6kh1e A0BWk2DcLwMIhCuEY0zoqv5T37shLAWIMJj2/0Fq8ptv6W0Eew8ZaqIyiv9agLJ5 wGSCFAzwL9A1xu+TAVle4ubOIilzmjaEmej3vY9+6JmTfbfvVt1JFo1dKjI2ICm3 6X+tuSHmpjxj+5W50ssWhzU+nrcfulpjOQ9D3lAFlrcd+Fx6I/axBGVVvAmN181H h36v4+WqPKo3IYSKz0fRzw7vHmWnpdLP87/NTJmaGwJiQPLISI6LzjS31asoohC+ mV6qDh0WkaZa6dCGBTUOZA0Cscbc7NpiZXMZXl6rSoH0ytLi4z/EXCl0EMgmno4x 2X5zG4Q404gXymrEgQBsLYlLXcN/QNGBg/Hfgix2/kuBc/Q4t/+96Fi6CZjp6/g1 YYsb5m0t8e8= =bmRc -----END PGP SIGNATURE-----