-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2018.0105
             Security updates for Microsoft Internet Explorer
                                9 May 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Internet Explorer
Operating System:     Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
                      Denial of Service               -- Remote with User Interaction
                      Access Confidential Data        -- Remote with User Interaction
                      Reduced Security                -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2018-8178 CVE-2018-8145 CVE-2018-8126
                      CVE-2018-8122 CVE-2018-8114 CVE-2018-1025
                      CVE-2018-1022 CVE-2018-0955 CVE-2018-0954
Member content until: Friday, June  8 2018

OVERVIEW

        Microsoft has released its monthly security patch update for the month of May
        2018. [1]  This update resolves 9 vulnerabilities across the following
        products:
         Internet Explorer 10
         Internet Explorer 11
         Internet Explorer 9


IMPACT

        Microsoft has given the following details regarding these vulnerabilities.
        
         Details         Impact                   Severity
         CVE-2018-0954  Remote Code Execution    Critical
         CVE-2018-0955  Remote Code Execution    Critical
         CVE-2018-1022  Remote Code Execution    Critical
         CVE-2018-1025  Information Disclosure   Important
         CVE-2018-8114  Remote Code Execution    Critical
         CVE-2018-8122  Remote Code Execution    Critical
         CVE-2018-8126  Security Feature Bypass  Important
         CVE-2018-8145  Information Disclosure   Important
         CVE-2018-8178  Remote Code Execution    Critical


MITIGATION

        Microsoft recommends updating the software with the version made available on
        the Microsoft Update Catalogue for the following Knowledge Base articles. [1]
        
        
         KB4103768, KB4103730, KB4103721, KB4103731, KB4103723
         KB4103718, KB4103727, KB4103716, KB4103725


REFERENCES

        [1] Security Update Guide
            https://portal.msrc.microsoft.com/en-us/security-guidance

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=tkSH
-----END PGP SIGNATURE-----