Vulnerability Details : CVE-2017-0201
A remote code execution vulnerability exists in Internet Explorer in the way that the JScript and VBScript engines render when handling objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0093.
Vulnerability category: OverflowMemory CorruptionExecute code
Products affected by CVE-2017-0201
- cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-0201
7.66%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-0201
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.6
|
5.9
|
NIST |
CWE ids for CVE-2017-0201
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-0201
-
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0201
CVE-2017-0201 - Security Update Guide - Microsoft - Scripting Engine Memory Corruption VulnerabilityPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/97454
Microsoft Internet Explorer CVE-2017-0201 Scripting Engine Remote Memory Corruption VulnerabilityThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1038238
Microsoft Internet Explorer Bugs Let Remote Users Bypass Cross-Domain Policies and Execute Arbitrary Code - SecurityTracker
Jump to