|CERT-In Vulnerability Note
Multiple vulnerabilities in Microsoft Edge
Original Issue Date:December 09, 2015
Severity Rating: HIGH
- Microsoft Windows 10 for 32-bit Systems
- Microsoft Windows 10 for x64-based Systems
- Microsoft Windows 10 Version 1511 for 32-bit Systems
- Microsoft Windows 10 Version 1511 for x64-based Systems
Multiple vulnerabilities have been reported in Microsoft Edge which could be exploited by a remote attacker to bypass security restrictions and execute arbitrary code on the targeted system.
1. Multiple Memory Corruption Vulnerabilities
Multiple memory corruption vulnerabilities exist in Microsoft edge due to improper handling of objects in the memory by the affected software. A remote attacker could exploit these vulnerabilities by convincing a user to visit a specially crafted website to trigger memory corruption .Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code with the privileges of the user .
2. Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists in Microsoft Edge due to improper enforcement of content types by the affected software. A remote attacker could exploit this vulnerability by enticing a user to view a malicious website to run scripting code with elevated privileges on the target system.
3. ASLR Security Bypass Vulnerability
This vulnerability exist in Microsoft edge due to non-usage of the Address Space Layout Randomization (ASLR) security feature which could allow an attacker to more reliably predict memory offsets of instructions in call stacks. A remote attacker could exploit this vulnerability by convincing a user to visit a specially crafted website to bypass ASLR security feature leading to execution of arbitrary code on the target system.
4. Microsoft Edge Spoofing vulnerability
A spoofing vulnerability exists in Microsoft edge due to improper parsing of HTTP responses. A remote attacker could exploit this vulnerability by convincing a user to visit a specially crafted website designed to spoof content or be used as a pivot to chain an attack with other vulnerabilities in web services.
5. Elevation of Privilege Vulnerability
This vulnerability exists in Microsoft Edge due to improper validation of permissions by the affected software. A remote attacker could exploit this vulnerability by persuading a user to view a malicious website. Successful exploitation of this vulnerability could allow a remote attacker to gain elevated privileges on the targeted system.
6. XSS Filter Bypass Vulnerability
A cross site vulnerability exist in Microsoft edge due to improper handling of HTML attribute in HTTP response data. A remote attacker could exploit this vulnerability by enticing the user to visit a specially crafted website designed to cause the XSS filter in Edge to disable HTML attributes.
Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary scripting code on the target users browser, leading to information disclosure.
Apply appropriate patches as mentioned in Microsoft Security Bulletin
The information provided herein is on "as is" basis, without warranty of any kind.
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
6, CGO Complex, Lodhi Road,
New Delhi - 110 003