First published: Tue Dec 12 2017(Updated: )
Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =11 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1511 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Internet Explorer | =10 | |
Microsoft Windows Server 2012 x64 | ||
Internet Explorer | =9 | |
Microsoft Windows Server 2008 Itanium | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11890 is rated as critical due to its potential for remote code execution.
To mitigate CVE-2017-11890, you should apply the latest security updates provided by Microsoft for the affected versions of Internet Explorer and Windows.
CVE-2017-11890 affects Internet Explorer 11 and various versions of Windows, including Windows 7 SP1, Windows 8.1, Windows 10, and several versions of Windows Server.
Yes, CVE-2017-11890 can be exploited remotely by an attacker through maliciously crafted web content.
CVE-2017-11890 is associated with attacks that enable the execution of arbitrary code in the context of the current user.