Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
References
Link Resource
http://www.securityfocus.com/bid/100056 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039094 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039095 Third Party Advisory VDB Entry
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8636 Patch Vendor Advisory
https://www.exploit-db.com/exploits/42466/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/42467/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/42468/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/42478/ Exploit Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: microsoft

Published: 2017-08-08T00:00:00

Updated: 2017-08-19T09:57:01

Reserved: 2017-05-03T00:00:00


Link: CVE-2017-8636

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-08-08T21:29:00.987

Modified: 2019-03-19T19:06:40.827


Link: CVE-2017-8636

JSON object: View

cve-icon Redhat Information

No data.

CWE