Multiple vulnerabilities in Windows Hyper-V

Published: 2017-08-08 22:15:02
Severity Medium
Patch available YES
Number of vulnerabilities 2
CVSSv2 6.1 (AV:A/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
4.5 (AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
CVSSv3 8.3 [CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
6.4 [CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE ID CVE-2017-8664
CVE-2017-8623
CWE ID CWE-20
Exploitation vector Local network
Public exploit Not available
Vulnerable software Windows
Windows Server
Vulnerable software versions Windows 8.1
Windows 10
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Vendor URL Microsoft
Advisory type Public

Security Advisory

1) Improper input validation

Description

The vulnerability allows a remote attacker to execute arbitrary code on the host server.

The vulnerability exists due to an error within Windows Hyper-V when processing input from guest operating system. A local user with access to guest operating system can execute arbitrary code on the host server.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable Hyper-V host server.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8664

2) Improper input validation

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an error when processing from a privileged user on a guest operating system in Microsoft Hyper-V Network Switch on a host server. A local user with privileged access to guest operating system can send a specially crafted data to the host operating system and perform a denial of service (DoS) attack.


Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8623

Back to List