CVE-2017-0290
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 does not properly scan a specially crafted file leading to memory corruption, aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability."
Published
2017-05-09T06:29:00.157
Last Modified
2025-04-20T01:37:25.860
Status
Deferred
Source
[email protected]
Severity
CVSSv3.0: 7.8 (HIGH)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
8.6
Impact Score
10.0
Weaknesses
Affected Vendors & Products
References
-
http://www.securityfocus.com/bid/98330
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id/1038419
([email protected])
-
http://www.securitytracker.com/id/1038420
([email protected])
-
https://0patch.blogspot.si/2017/05/0patching-worst-windows-remote-code.html
([email protected])
-
https://arstechnica.com/information-technology/2017/05/windows-defender-nscript-remote-vulnerability/
Press/Media Coverage, Third Party Advisory
([email protected])
-
https://bugs.chromium.org/p/project-zero/issues/detail?id=1252
Exploit, Third Party Advisory
([email protected])
-
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0290
Vendor Advisory
([email protected])
-
https://technet.microsoft.com/library/security/4022344
Patch, Vendor Advisory
([email protected])
-
https://twitter.com/natashenka/status/861748397409058816
Exploit, Third Party Advisory
([email protected])
-
https://www.exploit-db.com/exploits/41975/
([email protected])
-
http://www.securityfocus.com/bid/98330
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id/1038419
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id/1038420
(af854a3a-2127-422b-91ae-364da2661108)
-
https://0patch.blogspot.si/2017/05/0patching-worst-windows-remote-code.html
(af854a3a-2127-422b-91ae-364da2661108)
-
https://arstechnica.com/information-technology/2017/05/windows-defender-nscript-remote-vulnerability/
Press/Media Coverage, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugs.chromium.org/p/project-zero/issues/detail?id=1252
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0290
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://technet.microsoft.com/library/security/4022344
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://twitter.com/natashenka/status/861748397409058816
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/41975/
(af854a3a-2127-422b-91ae-364da2661108)