CVE-2017-11886
7.5HIGHMicrosoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow an attacker
게시됨: 12/12/2017업데이트됨: 4/20/2025
설명
Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
AI 분석AI 기반
영향받는 제품
microsoftinternet_explorer
11
microsoftwindows_10
-
microsoftwindows_10
1511
microsoftwindows_10
1607
microsoftwindows_10
1703
microsoftwindows_10
1709
microsoftwindows_7
-
microsoftwindows_8.1
-
microsoftwindows_rt_8.1
-
microsoftwindows_server_2008
r2
microsoftwindows_server_2012
r2
microsoftwindows_server_2016
-
microsoftinternet_explorer
10
microsoftwindows_server_2012
-
microsoftinternet_explorer
9
microsoftwindows_server_2008
-
참조
- http://www.securityfocus.com/bid/102062Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039991Third Party AdvisoryVDB Entry
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11886PatchVendor Advisory
- http://www.securityfocus.com/bid/102062Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039991Third Party AdvisoryVDB Entry
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11886PatchVendor Advisory