First published: Thu Nov 02 2017(Updated: )
ChakraCore allows an attacker to gain the same user rights as the current user, due to the way that the ChakraCore scripting engine handles objects in memory. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft ChakraCore |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11767 has been rated as critical due to its potential to allow an attacker to gain administrative rights.
To fix CVE-2017-11767, users should update to the latest version of Microsoft ChakraCore where the vulnerability has been addressed.
CVE-2017-11767 can facilitate attacks that allow an attacker to execute arbitrary code with the same user rights as the logged-in user.
CVE-2017-11767 affects all versions of Microsoft ChakraCore prior to the security update that addresses the vulnerability.
Yes, CVE-2017-11767 can potentially be exploited remotely if an attacker can convince the user to run malicious scripts.