Risk | High |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2017-11937 CVE-2017-11940 |
CWE-ID | CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Microsoft Security Essentials Client/Desktop applications / Antivirus software/Personal firewalls Windows Defender Client/Desktop applications / Antivirus software/Personal firewalls Microsoft Endpoint Protection Client/Desktop applications / Antivirus software/Personal firewalls Windows Intune Endpoint Protection Client/Desktop applications / Antivirus software/Personal firewalls Microsoft Forefront Endpoint Protection Server applications / DLP, anti-spam, sniffers Microsoft Exchange Server Server applications / Mail servers |
Vendor | Microsoft |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU9547
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-11937
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when scanning by the target Microsoft Malware Protection Engine. A remote attacker can trick the victim into opening a specially crafted file, trigger memory corruption and execute arbitrary code with LocalSystem privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate to version 1.1.14405.2.
Vulnerable software versionsMicrosoft Security Essentials: All versions
Windows Defender: for Windows 8.1 - on Windows Server 2008
Microsoft Forefront Endpoint Protection: 2010
Microsoft Exchange Server: 2013 RTM 15.00.0516.032 - 2016 RTM 15.01.0225.042
Microsoft Endpoint Protection: All versions
External linkshttp://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11937
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9598
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-11940
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when scanning by the target Microsoft Malware Protection Engine. A remote attacker can trick the victim into opening a specially crafted file, trigger memory corruption and execute arbitrary code with LocalSystem privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate to version 1.1.14405.2.
Vulnerable software versionsMicrosoft Security Essentials: All versions
Windows Defender: for Windows 8.1 - on Windows Server 2008
Microsoft Forefront Endpoint Protection: 2010
Microsoft Exchange Server: 2013 RTM 15.00.0516.032 - 2016 RTM 15.01.0225.042
Microsoft Endpoint Protection: All versions
Windows Intune Endpoint Protection: All versions
External linkshttp://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11940
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.