Severity Rating: HIGH
Software Affected
Microsoft ChakraCore
Internet Explorer 11
Microsoft Edge (EdgeHTML-based)
Overview
This vulnerability has been reported in Microsoft browsers which could
allow remote attacker to execute arbitrary code on the targeted system.
Description
This vulnerability exists in Microsoft browsers due to accessing objects in
memory. A remote attacker could exploit this vulnerability by adding
specially crafted content.
Successful exploitation of this vulnerability could allow a remote attacker
to execute arbitrary code in the context of the current user and take
control of an affected system.
Solution
Apply appropriate software fixes as available on the vendor website.
Software Affected
Microsoft ChakraCore
Internet Explorer 11
Microsoft Edge (EdgeHTML-based)
Overview
This vulnerability has been reported in Microsoft browsers which could
allow remote attacker to execute arbitrary code on the targeted system.
Description
This vulnerability exists in Microsoft browsers due to accessing objects in
memory. A remote attacker could exploit this vulnerability by adding
specially crafted content.
Successful exploitation of this vulnerability could allow a remote attacker
to execute arbitrary code in the context of the current user and take
control of an affected system.
Solution
Apply appropriate software fixes as available on the vendor website.
https://portal.msrc.microsoft.com/en-US/security-guidance
Vendor Information
Microsoft
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020- -1219
References
Microsoft
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020 -1219
CVE Name
CVE-2020-1219
Vendor Information
Microsoft
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020- -1219
References
Microsoft
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020 -1219
CVE Name
CVE-2020-1219
About Cert Advisory
We have created this blog to provide latest security advisory from the india cert for the security vulnerability, threats, attacks and patching required to mitigate any kind of cyber attacks.