Operating System:

[WIN]

Published:

13 December 2017

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2017.0213
                    Security patches for Microsoft Edge
                             13 December 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Microsoft Edge
Operating System:     Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Access Confidential Data        -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2017-11919 CVE-2017-11918 CVE-2017-11914
                      CVE-2017-11912 CVE-2017-11911 CVE-2017-11910
                      CVE-2017-11909 CVE-2017-11908 CVE-2017-11905
                      CVE-2017-11895 CVE-2017-11894 CVE-2017-11893
                      CVE-2017-11889 CVE-2017-11888 
Member content until: Friday, January 12 2018

OVERVIEW

        Microsoft has released its monthly security patch update for the month
        of December 2017. [1]
        
        This update resolves 14 vulnerabilities across the following products: 
        
         Microsoft Edge


IMPACT

        Microsoft has given the following details regarding these vulnerabilities.
        
         Details         Impact                   Severity
         CVE-2017-11888   Remote Code Execution    Critical
         CVE-2017-11889   Remote Code Execution    Critical
         CVE-2017-11893   Remote Code Execution    Critical
         CVE-2017-11894   Remote Code Execution    Critical
         CVE-2017-11895   Remote Code Execution    Critical
         CVE-2017-11905   Remote Code Execution    Critical
         CVE-2017-11908   Remote Code Execution    Critical
         CVE-2017-11909   Remote Code Execution    Critical
         CVE-2017-11910   Remote Code Execution    Critical
         CVE-2017-11911   Remote Code Execution    Critical
         CVE-2017-11912   Remote Code Execution    Critical
         CVE-2017-11914   Remote Code Execution    Critical
         CVE-2017-11918   Remote Code Execution    Critical
         CVE-2017-11919   Information Disclosure   Important


MITIGATION

        Microsoft recommends updating the software with the version made
        available on the Microsoft Update Catalogue for the following
        Knowledge Base articles. [1]
        
        
         KB4054517, KB4053580, KB4053581, KB4053579, KB4053578


REFERENCES

        [1] Security Update Guide
            https://portal.msrc.microsoft.com/en-us/security-guidance

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=GPwg
-----END PGP SIGNATURE-----