CVE-2018-0961
CVSS7.4
发布时间 :2018-05-09 15:29:00
修订时间 :2018-06-14 10:14:36
NMS    

[原文]A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate vSMB packet data, aka "Hyper-V vSMB Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS分值: 7.4 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: ADJACENT_NETWORK [--]
身份认证: SINGLE_INSTANCE [--]

- CWE (弱点类目)

CWE-20 [输入验证不恰当]

- CPE (受影响的平台与产品)

cpe:/o:microsoft:windows_10:1607
cpe:/o:microsoft:windows_10:1703
cpe:/o:microsoft:windows_10:1709
cpe:/o:microsoft:windows_10:1803
cpe:/o:microsoft:windows_server_2016:-
cpe:/o:microsoft:windows_server_2016:1709
cpe:/o:microsoft:windows_server_2016:1803

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0961
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-0961
(官方数据源) NVD

- 其它链接及资源

http://www.securityfocus.com/bid/104032
(VENDOR_ADVISORY)  BID  104032
http://www.securitytracker.com/id/1040843
(VENDOR_ADVISORY)  SECTRACK  1040843
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0961
(VENDOR_ADVISORY)  CONFIRM  https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0961

- 漏洞信息

Microsoft Windows Hyper-V CVE-2018-0961 Remote Code Execution Vulnerability
Input Validation Error 104032
Yes No
2018-05-08 12:00:00 2018-05-08 12:00:00
Microsoft

- 受影响的程序版本

Microsoft Windows Server 2016 0
Microsoft Windows Server 1803 0
Microsoft Windows Server 1709 0
Microsoft Windows 10 Version 1803 for x64-based Systems 0
Microsoft Windows 10 version 1709 for x64-based Systems 0
Microsoft Windows 10 version 1703 for x64-based Systems 0
Microsoft Windows 10 Version 1607 for x64-based Systems 0

- 漏洞讨论

Microsoft Windows is prone to a remote code-execution vulnerability.

Successful exploits allow attackers to execute arbitrary code in the context of the host operating system. Failed exploit attempts will result in a denial of service condition.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站