Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
References
Link Resource
http://www.securityfocus.com/bid/102082 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039991 Third Party Advisory VDB Entry
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11890 Patch Vendor Advisory
https://www.exploit-db.com/exploits/43369/ Exploit Issue Tracking Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: microsoft

Published: 2017-12-12T00:00:00

Updated: 2017-12-21T10:57:01

Reserved: 2017-07-31T00:00:00


Link: CVE-2017-11890

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-12-12T21:29:01.087

Modified: 2017-12-26T14:56:19.027


Link: CVE-2017-11890

JSON object: View

cve-icon Redhat Information

No data.

CWE