JPCERT/CC
2018-12-20
Microsoft Internet Explorer の脆弱性 (CVE-2018-8653) に関する注意喚起
https://www.jpcert.or.jp/at/2018/at180051.html
I.概要
https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2018-8653
II.対象
– Windows 10 Version 1703 for 32-bit Systems (KB4483230)
– Windows 10 Version 1703 for x64-based Systems (KB4483230)
– Windows 10 Version 1803 for 32-bit Systems (KB4483234)
– Windows 10 Version 1803 for x64-based Systems (KB4483234)
– Windows 10 Version 1803 for ARM64-based Systems (KB4483234)
– Windows 10 Version 1809 for 32-bit Systems (KB4483235)
– Windows 10 Version 1809 for x64-based Systems (KB4483235)
– Windows 10 Version 1809 for ARM64-based Systems (KB4483235)
– Windows Server 2019 (KB4483235)
– Windows 10 Version 1709 for 32-bit Systems (KB4483232)
– Windows 10 Version 1709 for 64-based Systems (KB4483232)
– Windows 10 Version 1709 for ARM64-based Systems (KB4483232)
– Windows 10 for 32-bit Systems (KB4483228)
– Windows 10 for x64-based Systems (KB4483228)
– Windows 10 Version 1607 for 32-bit Systems (KB4483229)
– Windows 10 Version 1607 for x64-based Systems (KB4483229)
– Windows Server 2016 (KB4483229)
– Windows 7 for 32-bit Systems Service Pack 1 (KB4483187)
– Windows 7 for x64-based Systems Service Pack 1 (KB4483187)
– Windows 8.1 for 32-bit systems (KB4483187)
– Windows 8.1 for x64-based systems (KB4483187)
– Windows RT 8.1 (KB4483187)
– Windows Server 2008 R2 for x64-based Systems Service Pack 1 (KB4483187)
– Windows Server 2012 R2 (KB4483187)
– Windows Server 2012 (KB4483187)
– Windows Server 2008 for 32-bit Systems Service Pack 2 (KB4483187)
– Windows Server 2008 for x64-based Systems Service Pack 2 (KB4483187)
III. 対策
https://www.catalog.update.microsoft.com/
https://support.microsoft.com/ja-JP/help/12373/windows-update-faq
IV. 参考情報
マイクロソフト株式会社
CVE-2018-8653 | スクリプト エンジンのメモリ破損の脆弱性
https://portal.msrc.microsoft.com/ja-JP/security-guidance/advisory/CVE-2018-8653
December 2018 Security Update Release
https://blogs.technet.microsoft.com/msrc/2018/12/19/december-2018-security-update-release-2/
2018 年 12 月のセキュリティ更新プログラム (月例)
https://blogs.technet.microsoft.com/jpsecurity/2018/12/12/201812-security-updates/
Microsoft Internet Explorer scripting engine JScript memory corruption vulnerability
https://www.kb.cert.org/vuls/id/573168/
Internet Explorer の JScript スクリプトエンジン におけるメモリ破損の脆弱性
https://jvn.jp/vu/JVNVU91880486/
一般社団法人 JPCERT コーディネーションセンター (JPCERT/CC)
MAIL:
TEL:03-6271-8901 FAX: 03-6271-8908
https://www.jpcert.or.jp/