First published: Thu Nov 02 2017(Updated: )
ChakraCore allows an attacker to gain the same user rights as the current user, due to the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability".
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/Microsoft.ChakraCore | <1.6.2 | 1.6.2 |
Microsoft Chakra | ||
ChakraCore |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11767 has been rated as critical due to its potential to allow an attacker to gain administrative rights.
To fix CVE-2017-11767, users should update to the latest version of Microsoft ChakraCore where the vulnerability has been addressed.
CVE-2017-11767 can facilitate attacks that allow an attacker to execute arbitrary code with the same user rights as the logged-in user.
CVE-2017-11767 affects all versions of Microsoft ChakraCore prior to the security update that addresses the vulnerability.
Yes, CVE-2017-11767 can potentially be exploited remotely if an attacker can convince the user to run malicious scripts.