Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-0987 : Vulnerability Insights and Analysis

Learn about CVE-2018-0987, a security flaw in Internet Explorer 9, 11, and 10 allowing information disclosure. Find out affected systems, exploitation risks, and mitigation steps.

A security vulnerability known as "Scripting Engine Information Disclosure Vulnerability" in Internet Explorer 9, 11, and 10 due to memory object handling.

Understanding CVE-2018-0987

What is CVE-2018-0987?

This vulnerability arises from the improper handling of memory objects by the scripting engine in Internet Explorer versions 9, 11, and 10.

The Impact of CVE-2018-0987

The vulnerability allows for information disclosure, potentially exposing sensitive data to unauthorized parties.

Technical Details of CVE-2018-0987

Vulnerability Description

The vulnerability in Internet Explorer allows attackers to access sensitive information due to memory object mishandling.

Affected Systems and Versions

        Internet Explorer 9 on Windows Server 2008 for 32-bit Systems Service Pack 2 and x64-based Systems Service Pack 2
        Internet Explorer 11 on various Windows versions including Windows 7, 8.1, 10, and Server editions
        Internet Explorer 10 on Windows Server 2012

Exploitation Mechanism

Attackers can exploit this vulnerability by crafting malicious websites or emails to trick users into visiting, leading to information disclosure.

Mitigation and Prevention

Immediate Steps to Take

        Apply security patches provided by Microsoft promptly
        Consider using alternative browsers until the patch is applied

Long-Term Security Practices

        Regularly update Internet Explorer and other software to the latest versions
        Educate users on safe browsing practices and recognizing phishing attempts

Patching and Updates

Microsoft has released security updates to address this vulnerability. Ensure all affected systems are updated with the latest patches.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now