First published: Wed Sep 13 2017(Updated: )
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Internet Explorer accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8749.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =10 | |
Internet Explorer | =11 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1511 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8747 has a critical severity rating due to its potential to allow remote code execution.
To mitigate CVE-2017-8747, it is recommended to apply the latest security updates provided by Microsoft.
CVE-2017-8747 affects various versions of Internet Explorer and Microsoft Windows operating systems including Windows 7 SP1, and Windows 8.1.
Yes, CVE-2017-8747 can be exploited remotely by an attacker to execute arbitrary code.
Exploitation of CVE-2017-8747 occurs in the context of the current user, which means the attacker must have access to the victim's session.