==================================================================== CERT-Renater Note d'Information No. 2017/VULN001 _____________________________________________________________________ DATE : 11/01/2017 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Windows versions 10, Server 2016 running Microsoft Edge. ===================================================================== https://technet.microsoft.com/en-us/library/security/MS17-001 ____________________________________________________________________ MS17-001 Security Update for Microsoft Edge (3214288) Published Date: January 10, 2017 Version: 1.0 Executive Summary This security update resolves a vulnerability in Microsoft Edge. This vulnerability could allow elevation of privilege if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerability could elevate privileges in affected versions of Microsoft Edge. This security update is rated Important for Microsoft Edge on Windows 10 and Windows Server 2016. For more information, see the Affected Software section. The update addresses the vulnerability by assigning a unique origin to top-level windows that navigate to Data URLs. For more information about the vulnerability, see the Vulnerability Information section. For more information about this update, see Microsoft Knowledge Base Article 3214288. Affected Software Windows 10 Windows Server 2016 Vulnerability Information Microsoft Edge Elevation of Privilege Vulnerability- CVE-2017-0002 An elevation of privilege vulnerability exists when Microsoft Edge does not properly enforce cross-domain policies with about:blank, which could allow an attacker to access information from one domain and inject it into another domain. An attacker who successfully exploited this vulnerability could elevate privileges in affected versions of Microsoft Edge. In a web-based attack scenario, an attacker could host a website that is used to attempt to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content could contain specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action. For example, an attacker could trick users into clicking a link that takes them to the attacker's site. The update addresses the vulnerability by assigning a unique origin to top-level windows that navigate to Data URLs. The following table contain a link to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list: Vulnerability title CVE number Publicly disclosed Exploited Microsoft Edge Elevation of Privilege Vulnerability CVE-2017-0002 Yes No ========================================================== Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================