{"vulnerability": "CVE-2018-8550", "sightings": [{"uuid": "19f8d08b-38f2-439d-aca3-3ab21fbdd64f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8550", "type": "seen", "source": "MISP/5bec5b59-b2b0-4506-9c63-32a40a021402", "content": "", "creation_timestamp": "2018-11-14T17:39:01.000000Z"}, {"uuid": "9890a463-5293-4e2b-b918-e846e940bec4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8550", "type": "exploited", "source": "https://www.exploit-db.com/exploits/45893", "content": "", "creation_timestamp": "2018-11-20T00:00:00.000000Z"}, {"uuid": "0658cfb6-311d-43ce-b52c-a0ffeb552dbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8550", "type": "published-proof-of-concept", "source": "https://t.me/antichat/2791", "content": "#windows #exploit #\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\n\nWindows LPE CVE-2018-8550\n\n\u0421\u0432\u0435\u0436\u0435\u0435 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 Windows \u0438\u0437-\u0437\u0430 \u0440\u044f\u0434\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 DfMarshal (COM Aggregate Marshaler).\n\u041d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043f\u0440\u0438\u043c\u0435\u0440\u043e\u0432 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0434\u043b\u044f Windows 10 1803 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u044e\u0442\u0441\u044f \u0442\u0443\u0442, \u043a\u0430\u043a \u0438 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435: https://bugs.chromium.org/p/project-zero/issues/detail?id=1644\n\u0418 \u0442\u0430\u043a \u043a\u0430\u043a \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e, \u0435\u0449\u0435 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u0442\u0435\u0445, \u043a\u043e\u043c\u0443 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438: https://bugs.chromium.org/p/project-zero/issues/detail?id=1645, https://bugs.chromium.org/p/project-zero/issues/detail?id=1646, https://bugs.chromium.org/p/project-zero/issues/detail?id=1647, https://bugs.chromium.org/p/project-zero/issues/detail?id=1648.\n\n\u0412\u0435\u0441\u044c \u043d\u0430\u0431\u043e\u0440 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u043b\u0435\u0447\u0438\u0442\u0441\u044f \u0435\u0434\u0438\u043d\u044b\u043c \u0444\u0438\u043a\u0441\u043e\u043c \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u043b \u043e\u0431\u0449\u0438\u0439 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2018-8550. \u0425\u043e\u0442\u044f \u043f\u0440\u0438\u043c\u0435\u0440\u044b \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u043d\u044b \u0434\u043b\u044f Windows 10, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0442 \u0438 \u0432 \u0434\u0440\u0443\u0433\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445: Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.\n \n\u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u044b, \u043f\u0435\u0440\u0435\u0447\u0435\u043d\u044c KB: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8550", "creation_timestamp": "2018-11-27T08:05:14.000000Z"}, {"uuid": "3fc48745-ab01-4999-873b-ff0e7b3be2a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8550", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/119", "content": "#exploit\nInformation security vulnerabilities:\n\n1. CVE-2018-3608:\nVulnerability in Trend Micro Maximum Security's 2018 (&gt;=12.0.1191) User-Mode Hooking driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes\nhttps://github.com/ZhiyuanWang-Chengdu-Qihoo360/Trend_Micro_POC\n\n2. CVE-2017-15944:\nPalo Alto Networks firewalls Remote RCE\nhttps://seclists.org/fulldisclosure/2017/Dec/38\n\n3. CVE-2018-8550:\nMS Windows 10 1803 - DfMarshal Unsafe Unmarshaling Privilege Escalation\nhttps://www.exploit-db.com/exploits/45893", "creation_timestamp": "2024-05-24T06:39:44.000000Z"}]}