Home

Jan 19, 2020

Microsoft offers workaround to mitigate the IE Scripting Engine Memory Corruption Vulnerability

authorarticle: Master3395
ie_11_logo.jpg
video: 
youtube: 
sources: 
keywords: microsoft, edge, ie, ie11, patch, workaround, IE Scripting Engine, scripting, engine, Corruption, Vulnerability
Category: Microsoft
Posted by: Admin

Clément Lecigne of Google’s Threat Analysis Group reported about an IE vulnerability that allowed remote execution of code via Internet Explorer.

Clément Lecigne of Google’s Threat Analysis Group reported about an IE vulnerability that allowed remote execution of code via Internet Explorer. The vulnerability lies in the way the scripting engine handles objects in memory in IE. Microsoft has disclosed the issue, and also offered a workaround for this Scripting Engine Memory Corruption Vulnerability (CVE-2020-0674).

By default, IE11, IE10, and IE9 use Jscript9.dll and are not impacted by this vulnerability. This vulnerability only affects certain websites that utilize JScrip.dll as the scripting engine.

How does an attacker execute remote code?
An attacker can set up a trap by sending a link to a specially crafted website over email. When the victim clicks on the link, the code will exploit the vulnerability through Internet Explorer

Workaround to mitigate IE Scripting Engine Memory Corruption Vulnerability
Once you have applied the patch, it will result in reduced functionality for components or features that rely on jscript.dll. However, it still doesn’t offer full protection, and it will be best not to use IE unless a permanent fix is rolled out. We highly recommend you to move to Microsoft Edge until the update becomes available. Microsoft is expected to patch this on its upcoming Patch Tuesday updates.

 
Restrict access to JScript.dll
For 32-bit systems, enter the following command at an administrative Command Prompt:

takeown /f %windir%\system32\jscript.dll
cacls %windir%\system32\jscript.dll /E /P everyone:N

For 64-bit systems, enter the following command at an administrative command prompt:

takeown /f %windir%\syswow64\jscript.dll
cacls %windir%\syswow64\jscript.dll /E /P everyone:N
takeown /f %windir%\system32\jscript.dll
cacls %windir%\system32\jscript.dll /E /P everyone:N

How to undo the workaround
Microsoft recommends reverting the mitigation steps before installing the update to return to a full state. Else any access to JScirpt.dll will suffer reduced functionality.

For 32-bit systems, enter the following command at an administrative command prompt:

cacls %windir%\system32\jscript.dll /E /R everyone

For 64-bit systems, enter the following command at an administrative command prompt:

cacls %windir%\system32\jscript.dll /E /R everyone
cacls %windir%\syswow64\jscript.dll /E /R everyone

Microsoft also shared that Internet Explorer on Windows Server copies (2008/2012/2016) run in a restricted mode known as Enhanced Security Configuration. It reduces the likelihood of a user or administrator downloading and running specially crafted web content on a server.

 

authorarticle: Master3395
ie_11_logo.jpg
video: 
youtube: 
sources: 
keywords: microsoft, edge, ie, ie11, patch, workaround, IE Scripting Engine, scripting, engine, Corruption, Vulnerability

Comments:

comments powered by Disqus

Return

Sponsored Ads:

Discord

Page 1 of 574  >  >>

iPhone 12 loses 20 percent battery life with 5G enabled

Apple.webp

Oct 22, 2020 | Category: Apple | Comments

Samsung and OnePlus beat Apple.

read more…

Here you can download new Windows 10 right away

Windows.webp

Oct 21, 2020 | Category: Microsoft | Comments

Microsoft only rolls out to some, but you can do it that way instead.

read more…

What's in the latest Edge update? Rollbacks and new browser telemetry policies

Edge.jpg

Oct 20, 2020 | Category: Microsoft | Comments

Microsoft's Edge 86 includes a "rollback" function that lets IT admins restore an earlier version of the browser and gives the built-in PDF viewer support for document tables of content.

read more…

Page 1 of 574  >  >>