CVE-2018-8298
Summary
| CVE | CVE-2018-8298 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-07-11 00:29:00 UTC |
| Updated | 2020-08-24 17:37:00 UTC |
| Description | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE-2018-8288, CVE-2018-8291, CVE-2018-8296. |
Risk And Classification
EPSS: 0.893700000 probability, percentile 0.995490000 (date 2026-05-02)
CISA KEV: Listed on 2022-03-03; due 2022-03-17; ransomware use Unknown
Problem Types: CWE-843
CISA Known Exploited Vulnerability
| Vendor | ChakraCore |
|---|---|
| Product | ChakraCore scripting engine |
| Name | ChakraCore Scripting Engine Type Confusion Vulnerability |
| Required Action | Apply updates per vendor instructions. |
| Notes | https://nvd.nist.gov/vuln/detail/CVE-2018-8298 |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Microsoft | Chakracore | All | All | All | All |
| Application | Microsoft | Chakracore | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Microsoft Edge Chakra JIT - InitializeNumberFormat and InitializeDateTimeFormat Type Confusion - Windows dos Exploit | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8298 | CONFIRM | portal.msrc.microsoft.com | Patch, Vendor Advisory |
| Microsoft ChakraCore Scripting Engine CVE-2018-8298 Remote Memory Corruption Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.