Operating System:

[WIN]

Published:

14 February 2018

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2018.0046
                 Security Updates for Microsoft ChakraCore
                             14 February 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              ChakraCore
Operating System:     Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2018-0860 CVE-2018-0859 CVE-2018-0858
                      CVE-2018-0857 CVE-2018-0856 CVE-2018-0840
                      CVE-2018-0838 CVE-2018-0837 CVE-2018-0836
                      CVE-2018-0835 CVE-2018-0834 
Member content until: Friday, March 16 2018
Reference:            ASB-2018.0044
                      ASB-2018.0043

OVERVIEW

        Microsoft has released its monthly security patch update for the month of
        February 2018. [1]  This update resolves 11 vulnerabilities across the
        following products:
         ChakraCore


IMPACT

        Microsoft has given the following details regarding these vulnerabilities.
        
         Details         Impact                   Severity
         CVE-2018-0834   Remote Code Execution    Critical
         CVE-2018-0835   Remote Code Execution    Critical
         CVE-2018-0836   Remote Code Execution    Important
         CVE-2018-0837   Remote Code Execution    Critical
         CVE-2018-0838   Remote Code Execution    Critical
         CVE-2018-0840   Remote Code Execution    Critical
         CVE-2018-0856   Remote Code Execution    Critical
         CVE-2018-0857   Remote Code Execution    Critical
         CVE-2018-0858   Remote Code Execution    Critical
         CVE-2018-0859   Remote Code Execution    Critical
         CVE-2018-0860   Remote Code Execution    Critical


MITIGATION

        Microsoft recommends updating the software with the version made available on
        the Microsoft Update Catalogue for the following Knowledge Base articles. [1]


REFERENCES

        [1] Security Update Guide
            https://portal.msrc.microsoft.com/en-us/security-guidance

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWoOxrox+lLeg9Ub1AQhFKhAAme3UQH+0wMcyc5kJGeR782+ZGlCznICe
aB+IE553FInmX4NVyiW3mZ98QHntm5q9vIXvR6El9HjFW6EeXp3GRjrPiizGTfzF
iRC8ZB1u4uyLD96m4NLM6uCnc5OXo4F/Ujx0AHMslohY0FYHLt3XLZYlQmy2kA8i
Rw+gC+gzPuKa8zUvzbhi0BSA/sL/eAU21kpf1Q3r70aLB7mbBdEnnaVQl98OXH6b
3J7r8K2y7EU9m0WDX1b9AKqzU6huhbiNh+8iM5bXF55jKibxVwqP8PGNNmw8Ukqq
VrbN/c1Ij5Pz5WUMUMY7iAB9xP27cm0ohYbWvByvFCH0E26m6Ut9zWT7qW1hHONU
9OgBtu727ahYamRaXIAidhSg4NN1NgYZ2/V4YZ8adiCSDZH8GiLFfd1CrP8SyAsi
1VNnIHFLnbQxs70zOmgSlE4ddgoBfCv5/0htyO/hIV2YTidS5B7sTO7Nletipive
5z49u5B4+4DaMg0+LcMIkhV3GgKxjJBL+dzcbprwOgpQq6lyUhjmc4wIum2V0j6u
8Me7PMLgHAf9W+5u8GDWh3xo/6v8mQ+rzWei9+3tJsRRJ00toFwY86S+wKvlddp0
dLfVeL9AUmK0w/UR6LgNnxDs5WJrKzDeSX4ZkRSGTGZD/mhFP54YsVzJI/PmO3tV
VLmbggNyIng=
=Gf2p
-----END PGP SIGNATURE-----