First published: Tue Aug 08 2017(Updated: )
Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =10 | |
Microsoft Windows Server 2012 x64 | ||
Internet Explorer | =11 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1511 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Internet Explorer | =9 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Edge |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8636 has a high severity rating due to its ability to allow arbitrary code execution.
To fix CVE-2017-8636, install the latest security updates released by Microsoft for affected versions of Internet Explorer and Windows.
CVE-2017-8636 affects Microsoft Internet Explorer versions 9, 10, and 11, and various Windows operating systems including Windows 7, 8.1, and Windows 10.
Yes, CVE-2017-8636 can be exploited remotely if the user visits a malicious website.
CVE-2017-8636 was identified as a zero-day vulnerability at the time of its discovery, as it was being actively exploited before a patch was available.