Дата обнаружения
|
09/05/2017 |
Уровень угрозы
|
Critical |
Описание
|
An improper way of scanning files was found in the Microsoft Malware Protection. By exploiting this vulnerability malicious users can execute arbitrary code. This vulnerability can be exploited remotely via a specially designed file. Technical details To exploit this vulnerability, a malformed file must be scanned by an affected version of the Windows Malware Protection Engine. The specially designed file can be delivered via a website, an email message or an Instant Messenger message. |
Пораженные продукты
|
Microsoft Windows 7 Service Pack 1 |
Решение
|
Verify that the latest version of the Microsoft Malware Protection Engine and all definition updates for Microsoft antimalware products are being actively downloaded. If necessary, install the update (version of the Microsoft Malware Protection Engine should be 1.1.13704.0 or later). |
Первичный источник обнаружения
|
Microsoft Security Advisory CVE-2017-0290 |
Оказываемое влияние
?
|
ACE
[?]
|
Связанные продукты
|
Microsoft Windows 7 Windows RT Microsoft Windows 10 |
CVE-IDS
|
|
Microsoft official advisories
|
Microsoft Security Update Guide |
Эксплуатация
|
The following public exploits exists for this vulnerability: https://www.exploit-db.com/exploits/41975 Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Узнай статистику распространения уязвимостей в твоем регионе |