-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2017.0214
             Security patches for Microsoft Internet Explorer
                             13 December 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Internet Explorer
Operating System:     Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Access Confidential Data        -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2017-11930 CVE-2017-11919 CVE-2017-11913
                      CVE-2017-11912 CVE-2017-11907 CVE-2017-11906
                      CVE-2017-11903 CVE-2017-11901 CVE-2017-11895
                      CVE-2017-11894 CVE-2017-11890 CVE-2017-11887
                      CVE-2017-11886  
Member content until: Friday, January 12 2018

OVERVIEW

        Microsoft has released its monthly security patch update for the
        month of December 2017. [1]
        
        This update resolves 13 vulnerabilities across the following products: 
        
         Internet Explorer 10
         Internet Explorer 11
         Internet Explorer 9


IMPACT

        Microsoft has given the following details regarding these vulnerabilities.
        
         Details         Impact                   Severity
         CVE-2017-11886   Remote Code Execution    Critical
         CVE-2017-11887   Information Disclosure   Important
         CVE-2017-11890   Remote Code Execution    Critical
         CVE-2017-11894   Remote Code Execution    Critical
         CVE-2017-11895   Remote Code Execution    Critical
         CVE-2017-11901   Remote Code Execution    Critical
         CVE-2017-11903   Remote Code Execution    Critical
         CVE-2017-11906   Information Disclosure   Important
         CVE-2017-11907   Remote Code Execution    Critical
         CVE-2017-11912   Remote Code Execution    Critical
         CVE-2017-11913   Remote Code Execution    Important
         CVE-2017-11919   Information Disclosure   Important
         CVE-2017-11930   Remote Code Execution    Critical


MITIGATION

        Microsoft recommends updating the software with the version
        made available on the Microsoft Update Catalogue for the following
        Knowledge Base articles. [1]
        
        
         KB4054520, KB4053580, KB4053581, KB4053579, KB4053578
         KB4054518, KB4054519, KB4054517, KB4052978


REFERENCES

        [1] Security Update Guide
            https://portal.msrc.microsoft.com/en-us/security-guidance

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=pkJE
-----END PGP SIGNATURE-----