Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2019-1038: Microsoft Browser Memory Corruption Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2019-1038: Microsoft Browser Memory Corruption Vulnerability

Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
06/11/2019
Created
06/12/2019
Added
06/11/2019
Modified
09/06/2024

Description

A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka 'Microsoft Browser Memory Corruption Vulnerability'.

Solution(s)

  • microsoft-windows-windows_10-1507-kb4503291
  • microsoft-windows-windows_10-1607-kb4503267
  • microsoft-windows-windows_10-1703-kb4503279
  • microsoft-windows-windows_10-1709-kb4503284
  • microsoft-windows-windows_10-1803-kb4503286
  • microsoft-windows-windows_10-1809-kb4503327
  • microsoft-windows-windows_10-1903-kb4503293
  • microsoft-windows-windows_server_2012-kb4503259
  • microsoft-windows-windows_server_2012_r2-kb4503259
  • microsoft-windows-windows_server_2016-1607-kb4503267
  • microsoft-windows-windows_server_2019-1809-kb4503327
  • msft-kb4503259-045af9bb-6259-4026-8c81-a2fe4e642e2e
  • msft-kb4503259-06dce259-74cb-4d71-9c1b-a3b695d7de14
  • msft-kb4503259-2abab4fe-71cf-4cc7-b155-79dbc1b376bf
  • msft-kb4503259-3feeaab3-07d8-4f4b-8044-95489cba6dfb
  • msft-kb4503259-53802e8d-14de-48f7-b9d8-de56be1c5f61
  • msft-kb4503259-8f68cc31-af76-4dd0-a301-e325aa1dfb7c
  • msft-kb4503259-a4f432d1-0317-4d1d-b1ef-7e35b05332d6
  • msft-kb4503259-a5b6f19d-573e-4dd9-b121-1871d3c0a5fd
  • msft-kb4503259-b090962b-44eb-43ef-9cfa-63e7f2837843
  • msft-kb4503259-c83d323e-070e-4c72-ab1f-7304b8031ddf
  • msft-kb4503259-d59834a9-bb46-4d7b-b0b8-6a15401abf0e
  • msft-kb4503259-f3444504-feef-4443-9314-03d9216c2253
  • msft-kb4503259-f91666f9-b79f-4ba4-be8c-fed6d240275b
  • msft-kb4503293-c6d3d33b-8eca-4003-9755-d7eb5e197ac7

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;