Risk | High |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2017-11937 CVE-2017-11940 |
CWE-ID | CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Microsoft Security Essentials Client/Desktop applications / Antivirus software/Personal firewalls Windows Defender Client/Desktop applications / Antivirus software/Personal firewalls Microsoft Endpoint Protection Client/Desktop applications / Antivirus software/Personal firewalls Windows Intune Endpoint Protection Client/Desktop applications / Antivirus software/Personal firewalls Microsoft Forefront Endpoint Protection Server applications / DLP, anti-spam, sniffers Microsoft Exchange Server Server applications / Mail servers |
Vendor | Microsoft |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU9547
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-11937
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when scanning by the target Microsoft Malware Protection Engine. A remote attacker can trick the victim into opening a specially crafted file, trigger memory corruption and execute arbitrary code with LocalSystem privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate to version 1.1.14405.2.
Vulnerable software versionsMicrosoft Security Essentials: All versions
Windows Defender: for Windows RT 8.1 - for Windows 10, Windows 10 1511, Windows 10 1607, Windows Server 2016, Windows 10 1703
Microsoft Forefront Endpoint Protection: 2010
Microsoft Exchange Server: 2013 RTM 15.00.0516.032 - 2016 RTM 15.01.0225.042
Microsoft Endpoint Protection: All versions
CPE2.3http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11937
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9598
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-11940
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when scanning by the target Microsoft Malware Protection Engine. A remote attacker can trick the victim into opening a specially crafted file, trigger memory corruption and execute arbitrary code with LocalSystem privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate to version 1.1.14405.2.
Vulnerable software versionsMicrosoft Security Essentials: All versions
Windows Defender: for Windows RT 8.1 - for Windows 10, Windows 10 1511, Windows 10 1607, Windows Server 2016, Windows 10 1703
Microsoft Forefront Endpoint Protection: 2010
Microsoft Exchange Server: 2013 RTM 15.00.0516.032 - 2016 RTM 15.01.0225.042
Microsoft Endpoint Protection: All versions
Windows Intune Endpoint Protection: All versions
CPE2.3http://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11940
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.