Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2017-8714 |
CWE-ID | CWE-119 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
Amazon Linux AMI Operating systems & Components / Operating system |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU8326
Risk: Medium
CVSSv3.1: 7.8 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-8714
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
A remote code execution vulnerability exists in the VM Host Agent Service of Remote Desktop Virtual Host role when it fails to properly validate input from an authenticated user on a guest operating system. A remote unauthenticated attacker can execute arbitrary code on the VM host operating system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected packages.
i686:Vulnerable software versions
R-core-3.3.3-1.51.amzn1.i686
R-java-devel-3.3.3-1.51.amzn1.i686
R-core-devel-3.3.3-1.51.amzn1.i686
R-devel-3.3.3-1.51.amzn1.i686
R-debuginfo-3.3.3-1.51.amzn1.i686
R-java-3.3.3-1.51.amzn1.i686
libRmath-devel-3.3.3-1.51.amzn1.i686
libRmath-static-3.3.3-1.51.amzn1.i686
libRmath-3.3.3-1.51.amzn1.i686
R-3.3.3-1.51.amzn1.i686
src:
R-3.3.3-1.51.amzn1.src
x86_64:
R-core-devel-3.3.3-1.51.amzn1.x86_64
R-devel-3.3.3-1.51.amzn1.x86_64
R-3.3.3-1.51.amzn1.x86_64
R-debuginfo-3.3.3-1.51.amzn1.x86_64
R-java-devel-3.3.3-1.51.amzn1.x86_64
libRmath-3.3.3-1.51.amzn1.x86_64
R-java-3.3.3-1.51.amzn1.x86_64
libRmath-devel-3.3.3-1.51.amzn1.x86_64
R-core-3.3.3-1.51.amzn1.x86_64
libRmath-static-3.3.3-1.51.amzn1.x86_64
Amazon Linux AMI: All versions
External linkshttp://alas.aws.amazon.com/ALAS-2017-819.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.