Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2018-0838Out-of-bounds Write in Corporation Internet Explorer

CWE-787Out-of-bounds Write54 documents10 sources
Severity
7.5HIGHNVD
EPSS
79.3%
top 0.92%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 15
Latest updateMay 13

Description

Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Patches

🔴Vulnerability Details

23
OSV
ChakraCore RCE Vulnerability2022-05-13
GHSA
GHSA-6cff-v7rr-93p7: Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 82022-05-13
OSV
ChakraCore RCE Vulnerability2022-05-13
GHSA
ChakraCore RCE Vulnerability2022-05-13
GHSA
ChakraCore RCE Vulnerability2022-05-13

💥Exploits & PoCs

1
Exploit-DB
Microsoft Edge Chakra JIT - 'NewScObjectNoCtor' Array Type Confusion2018-02-15

📋Vendor Advisories

1
Microsoft
Scripting Engine Memory Corruption Vulnerability2018-02-13

🕵️Threat Intelligence

16
Fortinet
An Analysis of the DLL Address Leaking Trick used by the “Double Kill” Internet Explorer Zero-Day exploit (CVE-2018-8174)2018-08-06
Fortinet
An Analysis of the Use-After-Free Bug in the Microsoft Edge Chakra Engine (CVE-2018-0946)2018-06-28
Fortinet
An Analysis of Microsoft Edge Chakra NewScObjectNoCtor Array Type Confusion (CVE-2018-0838)2018-05-18
Trendmicro
February Patch Tuesday Fixes Privilege Escalation Bugs2018-02-14
Trendmicro
February Patch Tuesday Fixes Privilege Escalation Bugs2018-02-14