HTTP: Microsoft Windows VBScript Engine Dynamic Array Use After Free

This signature detects attempt to exploit a memory corruption vulnerability which exists in the Microsoft Windows VBScript engine. A remote attacker can exploit this vulnerability by enticing a user to open a crafted web page using Internet Explorer or a crafted Microsoft Office document. Successful exploitation could allow the attacker to execute arbitrary code in the context of the application.

Extended Description

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.

References

CVE: CVE-2018-8373

Short Name
HTTP:STC:MSWIN-VB-ARRAY-UAF
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
After Array CVE-2018-8373 Dynamic Engine Free Microsoft Use VBScript Windows
Release Date
10/04/2018
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3415
False Positive
Unknown
CVSS Score

7.6

Found a potential security threat?