CVE-2021-26419 - Security Update Guide - Microsoft - Scripting Engine Memory Cor...
source link: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26419
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
-
- Customer Guidance
-
-
Scripting Engine Memory Corruption Vulnerability
CVE-2021-26419Released: May 11, 2021
Please see Common Vulnerability Scoring System for more information on the definition of these metrics.
Exploitability
The CVSS Score indicates that User Interaction is required to exploit this vulnerability. What type of interaction would the user have to do to allow exploitation?
In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine.
The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability.
Acknowledgements
- Ivan Fratric of Google Project Zero
Security Updates
- Monthly Rollup
Disclaimer
Revisions
Information published.
Recommend
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK