GLSA-202402-05 : Microsoft Edge: Multiple Vulnerabilities

critical Nessus Plugin ID 189968

Description

The remote host is affected by the vulnerability described in GLSA-202402-05 (Microsoft Edge: Multiple Vulnerabilities)

- Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability (CVE-2023-29345)

- Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability (CVE-2023-33143, CVE-2023-35618, CVE-2023-36562, CVE-2023-36735, CVE-2023-36741, CVE-2023-36787)

- Microsoft Edge (Chromium-based) Information Disclosure Vulnerability (CVE-2023-33145, CVE-2023-36409, CVE-2023-36880, CVE-2023-38174)

- Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability (CVE-2023-36022, CVE-2023-36034)

- Microsoft Edge (Chromium-based) Spoofing Vulnerability (CVE-2023-36029, CVE-2023-36559, CVE-2023-36727)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

All Microsoft Edge users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose >=www-client/microsoft-edge-120.0.2210.61

See Also

https://security.gentoo.org/glsa/202402-05

https://bugs.gentoo.org/show_bug.cgi?id=907817

https://bugs.gentoo.org/show_bug.cgi?id=908518

https://bugs.gentoo.org/show_bug.cgi?id=918586

https://bugs.gentoo.org/show_bug.cgi?id=919495

Plugin Details

Severity: Critical

ID: 189968

File Name: gentoo_GLSA-202402-05.nasl

Version: 1.0

Type: local

Published: 2/3/2024

Updated: 2/3/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-36787

CVSS v3

Risk Factor: Critical

Base Score: 9.6

Temporal Score: 8.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2023-36735

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:microsoft-edge, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/3/2024

Vulnerability Publication Date: 6/3/2023

Reference Information

CVE: CVE-2023-29345, CVE-2023-33143, CVE-2023-33145, CVE-2023-35618, CVE-2023-36022, CVE-2023-36029, CVE-2023-36034, CVE-2023-36409, CVE-2023-36559, CVE-2023-36562, CVE-2023-36727, CVE-2023-36735, CVE-2023-36741, CVE-2023-36787, CVE-2023-36880, CVE-2023-38174