SB2017031425 - Multiple vulnerabilities in Microsoft Windows Hyper-V
Published: March 14, 2017 Updated: November 18, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 11 secuirty vulnerabilities.
1) Privilege escalation (CVE-ID: CVE-2017-0021)
The vulnerability allows a remote attacker with access to guest operating system to execute arbitrary code on the host system.
The vulnerability exists due to input validation error when processing SMB packets in Windows Hyper-V. A remote attacker with access to guest system can send specially crafted SMB packets to the host system and execute arbitrary code on the host system.
Successful exploitation of this vulnerability may allow an attacker to compromise the host system.
2) Privilege escalation (CVE-ID: CVE-2017-0095)
The vulnerability allows a remote attacker with access to guest operating system to execute arbitrary code on the host system.
The vulnerability exists due to input validation error when processing SMB packets in Windows Hyper-V. A remote attacker with access to guest system can send specially crafted SMB packets to the host system and execute arbitrary code on the host system.
Successful exploitation of this vulnerability may allow an attacker to compromise the host system.
3) Out-of-bounds memory access (CVE-ID: CVE-2017-0051)
The vulnerability allows a remote attacker with privileged access to guest operating system to perform a denial of service (DoS) attack.
Successful exploitation of this vulnerability may result denial of service attack again the host system.
4) Out-of-bounds memory access (CVE-ID: CVE-2017-0074)
The vulnerability allows a remote attacker with privileged access to guest operating system to perform a denial of service (DoS) attack.
Successful exploitation of this vulnerability may result denial of service attack again the host system.
5) Out-of-bounds memory access (CVE-ID: CVE-2017-0076)
The vulnerability allows a remote attacker with privileged access to guest operating system to perform a denial of service (DoS) attack.
The vulnerability exists due to out-of-bounds memory access in Microsoft Hyper-V Network Switch. An attacker with privileged access to guest operating system can use a specially crafted application to trigger out-of-bounds memory access and cause the host machine to crash.
6) Out-of-bounds memory access (CVE-ID: CVE-2017-0097)
The vulnerability allows a remote attacker with privileged access to guest operating system to perform a denial of service (DoS) attack.
Successful exploitation of this vulnerability may result denial of service attack again the host system.
7) Out-of-bounds memory access (CVE-ID: CVE-2017-0099)
The vulnerability allows a remote attacker with privileged access to guest operating system to perform a denial of service (DoS) attack.
Successful exploitation of this vulnerability may result denial of service attack again the host system.
8) Out-of-bounds memory access (CVE-ID: CVE-2017-0098)
The vulnerability allows a remote attacker with privileged access to guest operating system to perform a denial of service (DoS) attack.
Successful exploitation of this vulnerability may result denial of service attack again the host system.
9) Improper input validation (CVE-ID: CVE-2017-0075)
The vulnerability allows a remote attacker with access to guest operating system to compromise the host system.
Successful exploitation of this vulnerability may allow an attacker to escalate privileges.
10) Improper input validation (CVE-ID: CVE-2017-0109)
The vulnerability allows a remote attacker with access to guest operating system to compromise the host system.
Successful exploitation of this vulnerability may allow an attacker to escalate privileges.
11) Information disclosure (CVE-ID: CVE-2017-0096)
The vulnerability allows a remote attacker with access to guest operating system to disclose memory information on the host system.
Successful exploitation of this vulnerability may allow an attacker to gain access to potentially sensitive information.
Remediation
Install update from vendor's website.