-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2017.0211
                    Microsoft Development Tools patched
                             13 December 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              ChakraCore
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Access Confidential Data        -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2017-11930 CVE-2017-11919 CVE-2017-11918
                      CVE-2017-11916 CVE-2017-11914 CVE-2017-11912
                      CVE-2017-11911 CVE-2017-11910 CVE-2017-11909
                      CVE-2017-11908 CVE-2017-11905 CVE-2017-11895
                      CVE-2017-11894 CVE-2017-11893 CVE-2017-11889
Member content until: Friday, January 12 2018

OVERVIEW

        Microsoft has released its monthly security patch update for
        the month of December 2017. [1]
        
        This update resolves 15 vulnerabilities across the following products: 
        
         ChakraCore


IMPACT

        Microsoft has given the following details regarding these vulnerabilities.
        
         Details         Impact                   Severity
         CVE-2017-11889   Remote Code Execution    Critical
         CVE-2017-11893   Remote Code Execution    Critical
         CVE-2017-11894   Remote Code Execution    Critical
         CVE-2017-11895   Remote Code Execution    Critical
         CVE-2017-11905   Remote Code Execution    Critical
         CVE-2017-11908   Remote Code Execution    Critical
         CVE-2017-11909   Remote Code Execution    Critical
         CVE-2017-11910   Remote Code Execution    Critical
         CVE-2017-11911   Remote Code Execution    Critical
         CVE-2017-11912   Remote Code Execution    Critical
         CVE-2017-11914   Remote Code Execution    Critical
         CVE-2017-11916   Remote Code Execution    Important
         CVE-2017-11918   Remote Code Execution    Critical
         CVE-2017-11919   Information Disclosure   Important
         CVE-2017-11930   Remote Code Execution    Important


MITIGATION

        Microsoft recommends updating the software with the version made
        available on the Microsoft Update Catalogue for the following
        Knowledge Base articles. [1]


REFERENCES

        [1] Security Update Guide
            https://portal.msrc.microsoft.com/en-us/security-guidance

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWjBroIx+lLeg9Ub1AQiHWg/+PHZssGF4D93Y98xuY4wjcUiBJUEDvJEL
XC912p4jRgSKef31msHMJruy3trKpubnztIV0F0Nhf7Ut0tHI74mYxzwlL5kJLBM
vcQQeRMoQXx9bZ6g34qv4xLCEQctDucbQF9F/K2MAxZaCz0aTM2GjmSplopuvusM
pMcBxhkViLntABuB4aBwWDiC1UjWlakMw73xsahCYeyOlTc3NKUlfVzuvg9iWiMZ
9C6/16RQPslAR0A8dH/X2Oxsz8TiuAHOd4bkzi0DH4mXBxndLn2OCpdZv0lam2xb
iKJ3QwsgudPK5fIMGSJo4RJC/ku/gY4gVeX8N7qIP8kXnFHyPlNVcH7nLZ/8Pl4N
/HH/DbKWt6HHTwhoHDUlRm4q5SltyDiPDnH4YC6QFcw9mGE5ErM/dX+QfROYHY4D
/D+id45veJSwSNVDDHCPro5frk2g3sckV1WDGjR7NLN2CM53WqJWKJ+MJxJ2NEHf
9V5x5ZDy7YTcFh5R5Kz9I1D9woQn9GeGp4q9DnKUSlltz0Kv8vRMn9UJGFS9HgFK
DdHczSwX8NO/jnxj4zWiYfexhHP63Q7MC0e88ctiyOV1RPODP9A/n41OsfGpzdaQ
ENl9suiglp79ndSi/VBbZioN/RTO2KP2hqJmGZOHgLHMdfRD8QKsZq5NzJvAxer+
I3E0MY93TaU=
=i+yP
-----END PGP SIGNATURE-----