-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2017.0162
                      Security updates for ChakraCore
                              11 October 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Microsoft ChakraCore
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2017-11821 CVE-2017-11812 CVE-2017-11811
                      CVE-2017-11809 CVE-2017-11808 CVE-2017-11807
                      CVE-2017-11806 CVE-2017-11805 CVE-2017-11804
                      CVE-2017-11802 CVE-2017-11801 CVE-2017-11799
                      CVE-2017-11797 CVE-2017-11796 CVE-2017-11792
Member content until: Friday, November 10 2017

OVERVIEW

        Microsoft has released its monthly security patch update for the month of October 2017. [1]
        
        This update resolves 15 vulnerabilities across the following products: 
        
         ChakraCore


IMPACT

        Microsoft has given the following details regarding these vulnerabilities.
        
         Details         Impact                   Severity
         CVE-2017-11792  Remote Code Execution    Critical
         CVE-2017-11796  Remote Code Execution    Critical
         CVE-2017-11797  Remote Code Execution    Critical
         CVE-2017-11799  Remote Code Execution    Critical
         CVE-2017-11801  Remote Code Execution    Critical
         CVE-2017-11802  Remote Code Execution    Critical
         CVE-2017-11804  Remote Code Execution    Critical
         CVE-2017-11805  Remote Code Execution    Critical
         CVE-2017-11806  Remote Code Execution    Critical
         CVE-2017-11807  Remote Code Execution    Critical
         CVE-2017-11808  Remote Code Execution    Critical
         CVE-2017-11809  Remote Code Execution    Critical
         CVE-2017-11811  Remote Code Execution    Critical
         CVE-2017-11812  Remote Code Execution    Critical
         CVE-2017-11821  Remote Code Execution    Critical


MITIGATION

        Microsoft recommends updating the software with the version made available on the Microsoft Update Cataloge for the following Knowledge Base articles. [1]


REFERENCES

        [1] Security Update Guide
            https://portal.msrc.microsoft.com/en-us/security-guidance

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=4g7N
-----END PGP SIGNATURE-----