Lucene search

K
kasperskyKaspersky LabKLA11101
HistorySep 12, 2017 - 12:00 a.m.

KLA11101 Arbitrary code execution vulnerability in Microsoft .NET Framework

2017-09-1200:00:00
Kaspersky Lab
threats.kaspersky.com
647

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.972 High

EPSS

Percentile

99.8%

An improper validation of untrusted input was found in Microsoft .NET Framework. By exploiting this vulnerability malicious users can execute arbitrary code. This vulnerability can be exploited remotely via a specially designed document or application.

Technical details

NB: This vulnerability does not have any public CVSS rating, so rating can be changed by the time.

Original advisories

CVE-2017-8759

CVE-2017-8759

Exploitation

This vulnerability can be exploited by the following malware:

https://threats.kaspersky.com/en/threat/Trojan-PSW.Win32.Azorult/

Public exploits exist for this vulnerability.

Related products

Microsoft-.NET-Framework

CVE list

CVE-2017-8759 critical

KB list

4038788

4038782

4038783

4038781

4040955

4040956

4040957

4040958

4040959

4040960

4040964

4040965

4040966

4040967

4040971

4040972

4040973

4040974

4040975

4040977

4040978

4040979

4040980

4040981

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

Affected Products

  • Microsoft .NET Framework 4.7Microsoft .NET Framework 2.0Microsoft .NET Framework 3.5Microsoft .NET Framework 3.5.1Microsoft .NET Framework 4.5.2Microsoft .NET Framework 4.6Microsoft .NET Framework 4.6.1Microsoft .NET Framework 4.6.2

References

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.972 High

EPSS

Percentile

99.8%