Home

Jan 19, 2020

Microsoft offers workaround to mitigate the IE Scripting Engine Memory Corruption Vulnerability


Clément Lecigne of Google’s Threat Analysis Group reported about an IE vulnerability that allowed remote execution of code via Internet Explorer.

Clément Lecigne of Google’s Threat Analysis Group reported about an IE vulnerability that allowed remote execution of code via Internet Explorer. The vulnerability lies in the way the scripting engine handles objects in memory in IE. Microsoft has disclosed the issue, and also offered a workaround for this Scripting Engine Memory Corruption Vulnerability (CVE-2020-0674).

By default, IE11, IE10, and IE9 use Jscript9.dll and are not impacted by this vulnerability. This vulnerability only affects certain websites that utilize JScrip.dll as the scripting engine.

How does an attacker execute remote code?
An attacker can set up a trap by sending a link to a specially crafted website over email. When the victim clicks on the link, the code will exploit the vulnerability through Internet Explorer

Workaround to mitigate IE Scripting Engine Memory Corruption Vulnerability
Once you have applied the patch, it will result in reduced functionality for components or features that rely on jscript.dll. However, it still doesn’t offer full protection, and it will be best not to use IE unless a permanent fix is rolled out. We highly recommend you to move to Microsoft Edge until the update becomes available. Microsoft is expected to patch this on its upcoming Patch Tuesday updates.

 
Restrict access to JScript.dll
For 32-bit systems, enter the following command at an administrative Command Prompt:

takeown /f %windir%\system32\jscript.dll
cacls %windir%\system32\jscript.dll /E /P everyone:N

For 64-bit systems, enter the following command at an administrative command prompt:

takeown /f %windir%\syswow64\jscript.dll
cacls %windir%\syswow64\jscript.dll /E /P everyone:N
takeown /f %windir%\system32\jscript.dll
cacls %windir%\system32\jscript.dll /E /P everyone:N

How to undo the workaround
Microsoft recommends reverting the mitigation steps before installing the update to return to a full state. Else any access to JScirpt.dll will suffer reduced functionality.

For 32-bit systems, enter the following command at an administrative command prompt:

cacls %windir%\system32\jscript.dll /E /R everyone

For 64-bit systems, enter the following command at an administrative command prompt:

cacls %windir%\system32\jscript.dll /E /R everyone
cacls %windir%\syswow64\jscript.dll /E /R everyone

Microsoft also shared that Internet Explorer on Windows Server copies (2008/2012/2016) run in a restricted mode known as Enhanced Security Configuration. It reduces the likelihood of a user or administrator downloading and running specially crafted web content on a server.

 

Category: Microsoft
Posted by: Admin
authorarticle: Master3395
ie_11_logo.jpg
video: 
youtube: 
sources: 
keywords: microsoft, edge, ie, ie11, patch, workaround, IE Scripting Engine, scripting, engine, Corruption, Vulnerability

Comments:

comments powered by Disqus

Return
Discord

Page 1 of 493  >  >>

Samsung confirms: these Galaxy models will not get Android 10

samsung.jpeg

Feb 28, 2020 | Category: Google | Comments

Someone in the customer service department is guaranteed to get a call afterward.

read more…

Soon you can save iPhone with WiFi - iOS 13.4 beta 3 released all testers

apple.jpeg

Feb 27, 2020 | Category: Apple | Comments

Internet recovery instead of having to connect to Mac or PC.

read more…

Opera may have done something brilliant with your browser

opera.jpg

Feb 26, 2020 | Category: IT | Comments

Organize the tabs as a virtual desktop for your browser.

read more…

Page 1 of 493  >  >>