Vulnerability Details : CVE-2018-0933
ChakraCore and Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874, CVE-2018-0930, CVE-2018-0931, CVE-2018-0934, CVE-2018-0936, and CVE-2018-0937.
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2018-0933
- cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-0933
79.58%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-0933
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.6
|
5.9
|
NIST |
CWE ids for CVE-2018-0933
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-0933
-
http://www.securityfocus.com/bid/103274
Microsoft ChakraCore Scripting Engine CVE-2018-0933 Remote Memory Corruption VulnerabilityThird Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/44396/
Microsoft Edge Chakra JIT - Stack-to-Heap Copy (Incomplete Fix) (1)Exploit;Third Party Advisory;VDB Entry
-
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0933
CVE-2018-0933 | Chakra Scripting Engine Memory Corruption VulnerabilityPatch;Vendor Advisory
-
http://www.securitytracker.com/id/1040507
Microsoft Edge Multiple Object Memory Handling Errors Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information - SecurityTrackerThird Party Advisory;VDB Entry
Jump to