Security Updates for Internet Explorer (January 2019)

high Nessus Plugin ID 121023

Synopsis

The Internet Explorer installation on the remote host is missing a security update.

Description

The Internet Explorer installation on the remote host is missing a security update. It is, therefore, affected by the following vulnerability :

- A remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input. An attacker could execute arbitrary code in the context of the current user. (CVE-2019-0541)

Solution

Microsoft has released the following security updates to address this issue:
-KB4480963
-KB4480968
-KB4480970
-KB4480965
-KB4480975

See Also

http://www.nessus.org/u?5fa9f1a3

http://www.nessus.org/u?be3b897d

http://www.nessus.org/u?df36ff32

http://www.nessus.org/u?9c55a9f6

http://www.nessus.org/u?14883957

Plugin Details

Severity: High

ID: 121023

File Name: smb_nt_ms19_jan_internet_explorer.nasl

Version: 1.10

Type: local

Agent: windows

Published: 1/8/2019

Updated: 11/30/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2019-0541

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/8/2019

Vulnerability Publication Date: 1/8/2019

CISA Known Exploited Vulnerability Due Dates: 5/3/2022

Reference Information

CVE: CVE-2019-0541

MSFT: MS19-4480963, MS19-4480965, MS19-4480968, MS19-4480970, MS19-4480975

MSKB: 4480963, 4480965, 4480968, 4480970, 4480975