KLA11012
Remote code execution vulnerability in the Microsoft Malware Protection Engine

Обновлено: 18/06/2020
Дата обнаружения
09/05/2017
Уровень угрозы
Critical
Описание

An improper way of scanning files was found in the Microsoft Malware Protection. By exploiting this vulnerability malicious users can execute arbitrary code. This vulnerability can be exploited remotely via a specially designed file.


Technical details

To exploit this vulnerability, a malformed file must be scanned by an affected version of the Windows Malware Protection Engine. The specially designed file can be delivered via a website, an email message or an Instant Messenger message.

Пораженные продукты

Microsoft Windows 7 Service Pack 1
Microsoft Windows 8.1
Microsoft Windows RT 8.1
Microsoft Windows 10

Решение

Verify that the latest version of the Microsoft Malware Protection Engine and all definition updates for Microsoft antimalware products are being actively downloaded. If necessary, install the update (version of the Microsoft Malware Protection Engine should be 1.1.13704.0 or later).

Первичный источник обнаружения
Microsoft Security Advisory
CVE-2017-0290
Оказываемое влияние
?
ACE 
[?]
Связанные продукты
Microsoft Windows 7
Windows RT
Microsoft Windows 10
CVE-IDS
CVE-2017-02909.3Critical
Microsoft official advisories
Microsoft Security Update Guide
Эксплуатация

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/41975

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Узнай статистику распространения уязвимостей в твоем регионе