ID CVE-2018-0986
Summary A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file, leading to memory corruption, aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability." This affects Windows Defender, Windows Intune Endpoint Protection, Microsoft Security Essentials, Microsoft System Center Endpoint Protection, Microsoft Exchange Server, Microsoft System Center, Microsoft Forefront Endpoint Protection.
References
Vulnerable Configurations
  • cpe:2.3:a:microsoft:exchange_server:2013:-:*:*:*:*:*:*
    cpe:2.3:a:microsoft:exchange_server:2013:-:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:exchange_server:2016:-:*:*:*:*:*:*
    cpe:2.3:a:microsoft:exchange_server:2016:-:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:security_essentials:-:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:security_essentials:-:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:forefront_endpoint_protection_2010:-:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:forefront_endpoint_protection_2010:-:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:intune_endpoint_protection:-:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:intune_endpoint_protection:-:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:system_center_endpoint_protection:*:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:system_center_endpoint_protection:*:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:-:*:*:*:*:*:*
    cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:-:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:r2:*:*:*:*:*:*
    cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:r2:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 09-09-2021 - 13:34)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
refmap via4
bid 103593
confirm https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0986
exploit-db 44402
sectrack 1040631
Last major update 09-09-2021 - 13:34
Published 04-04-2018 - 17:29
Last modified 09-09-2021 - 13:34
Back to Top