cnvd-2017-15844
Vulnerability from cnvd
Title
Microsoft Malware Protection Engine远程执行代码漏洞
Description
Microsoft Malware Protection Engine是一款微软的恶意程序保护引擎。 Microsoft Malware Protection Engine在实现上存在安全漏洞,允许远程攻击者利用漏洞提交特殊请求,执行任意代码。
Severity
Patch Name
Microsoft Malware Protection Engine远程执行代码漏洞的补丁
Patch Description
Microsoft Malware Protection Engine是一款微软的恶意程序保护引擎。 Microsoft Malware Protection Engine在实现上存在安全漏洞,允许远程攻击者利用漏洞提交特殊请求,执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下厂商提供的安全补丁以修复该漏洞: http://technet.microsoft.com/security/bulletin/

Reference
http://www.securityfocus.com/bid/99262/ https://nvd.nist.gov/vuln/detail/CVE-2017-8558
Impacted products
Name
['Microsoft Security Essentials', 'Microsoft Windows Defender', 'Symantec Endpoint Protection', 'Microsoft Windows Intune Endpoint Protection 0', 'Microsoft Forefront Endpoint Protection 0']
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "99262"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-8558"
    }
  },
  "description": "Microsoft Malware Protection Engine\u662f\u4e00\u6b3e\u5fae\u8f6f\u7684\u6076\u610f\u7a0b\u5e8f\u4fdd\u62a4\u5f15\u64ce\u3002\r\n\r\nMicrosoft Malware Protection Engine\u5728\u5b9e\u73b0\u4e0a\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u8bf7\u6c42\uff0c\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
  "discovererName": "Tavis Ormandy of Google Project Zero",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://technet.microsoft.com/security/bulletin/",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-15844",
  "openTime": "2017-07-21",
  "patchDescription": "Microsoft Malware Protection Engine\u662f\u4e00\u6b3e\u5fae\u8f6f\u7684\u6076\u610f\u7a0b\u5e8f\u4fdd\u62a4\u5f15\u64ce\u3002\r\n\r\nMicrosoft Malware Protection Engine\u5728\u5b9e\u73b0\u4e0a\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u8bf7\u6c42\uff0c\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Microsoft Malware Protection Engine\u8fdc\u7a0b\u6267\u884c\u4ee3\u7801\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Microsoft Security Essentials",
      "Microsoft Windows Defender",
      "Symantec Endpoint Protection",
      "Microsoft Windows Intune Endpoint Protection 0",
      "Microsoft Forefront Endpoint Protection 0"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/bid/99262/\r\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-8558",
  "serverity": "\u9ad8",
  "submitTime": "2017-06-26",
  "title": "Microsoft Malware Protection Engine\u8fdc\u7a0b\u6267\u884c\u4ee3\u7801\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…