CVE编号
CVE-2019-1106利用情况
暂无补丁情况
N/A披露时间
2019-07-09漏洞描述
Chakra脚本引擎处理Microsoft Edge内存中对象的方式中存在一个远程执行代码漏洞,即“Chakra脚本引擎内存损坏漏洞”。该CVE ID独特于CVE-2019-1062,CVE-2019-1092,CVE-2019-1103,CVE-2019-1107。解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1106
参考链接 |
|
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1106 | |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1106 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | microsoft | chakracore | * |
Up to (excluding) 1.11.11 |
|||||
运行在以下环境 | |||||||||
应用 | microsoft | edge | - | - | |||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | gradle | * |
Up to (excluding) 1.1.28-6.1.al7 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.10 | gradle | * |
Up to (excluding) 1.1.33-r1 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.11 | gradle | * |
Up to (excluding) 1.1.33-r1 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | gradle | * |
Up to (excluding) 1.1.33-r1 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | gradle | * |
Up to (excluding) 1.1.33-r1 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.6 | gradle | * |
Up to (excluding) 1.1.29-r4 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.7 | gradle | * |
Up to (excluding) 1.1.31-r1 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.8 | gradle | * |
Up to (excluding) 1.1.33-r1 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.9 | gradle | * |
Up to (excluding) 1.1.33-r1 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_edge | gradle | * |
Up to (excluding) 1.1.33-r1 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | gradle | * |
Up to (excluding) 1.1.28-6.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | gradle | * |
Up to (excluding) 1.1.28-6.15.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | gradle | * |
Up to (excluding) 1.1.32-2.1~deb10u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | gradle | * |
Up to (excluding) 1.1.28-2+deb8u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | gradle | * |
Up to (excluding) 1.1.29-2.1+deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | gradle | * |
Up to (excluding) 4.3.1-9.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_29 | gradle | * |
Up to (excluding) 4.3.1-9.fc29 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_30 | gradle | * |
Up to (excluding) 4.4.1-4.fc30 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | gradle | * |
Up to (excluding) 2.1.4-lp150.2.16.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | gradle | * |
Up to (excluding) 2.3.1-lp151.2.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | gradle | * |
Up to (excluding) 1.1.28-13.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | gradle | * |
Up to (excluding) 1.1.28-6.0.1.el7 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | gradle | * |
Up to (excluding) 1.1.32-5.0.1.el8 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP3 | gradle | * |
Up to (excluding) 1.1.28-17.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | gradle | * |
Up to (excluding) 1.1.28-17.3.1 |
|||||
- 攻击路径 网络
- 攻击复杂度 高
- 权限要求 无
- 影响范围 未更改
- 用户交互 需要
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...