9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
High
0.949 High
EPSS
Percentile
99.3%
This host is missing an important security
update according to Microsoft Security Updates released for Microsoft Malware
Protection Engine dated 05-25-2017
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.811067");
script_version("2023-07-25T05:05:58+0000");
script_xref(name:"CISA", value:"Known Exploited Vulnerability (KEV) catalog");
script_xref(name:"URL", value:"https://www.cisa.gov/known-exploited-vulnerabilities-catalog");
script_cve_id("CVE-2017-8535", "CVE-2017-8536", "CVE-2017-8537", "CVE-2017-8538",
"CVE-2017-8539", "CVE-2017-8540", "CVE-2017-8541", "CVE-2017-8542");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2023-07-25 05:05:58 +0000 (Tue, 25 Jul 2023)");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2017-08-13 01:29:00 +0000 (Sun, 13 Aug 2017)");
script_tag(name:"creation_date", value:"2017-06-02 09:40:39 +0530 (Fri, 02 Jun 2017)");
script_tag(name:"qod_type", value:"executable_version");
script_name("Microsoft Malware Protection Engine on Windows Defender Multiple Vulnerabilities");
script_tag(name:"summary", value:"This host is missing an important security
update according to Microsoft Security Updates released for Microsoft Malware
Protection Engine dated 05-25-2017");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws are due to:
- Multiple errors when the Microsoft Malware Protection Engine does not properly
scan a specially crafted file, leading to a scan timeout.
- Multiple errors when the Microsoft Malware Protection Engine does not properly scan a
specially crafted file, leading to memory corruption.");
script_tag(name:"impact", value:"Successful exploitation will allow an attacker
to execute arbitrary code in the security context of the LocalSystem account
and take control of the system. Also an attacker can lead to denial of service
preventing the Microsoft Malware Protection Engine from monitoring affected
systems until the service is restarted.");
script_tag(name:"affected", value:"- Microsoft Windows 8.1
- Microsoft Windows 7 SP1
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
- Microsoft Windows Server 2016 x64
- Microsoft Windows Server 2008 SP2
- Microsoft Windows Server 2008 R2 SP1
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows 10 Version 1703 x32/x64");
script_tag(name:"solution", value:"Run the Windows Update to update the malware
protection engine to the latest version available. Typically, no action is
required as the built-in mechanism for the automatic detection and deployment
of updates will apply the update itself.");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"URL", value:"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8535");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98702");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98708");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98705");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98706");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98704");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98703");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98710");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/98707");
script_xref(name:"URL", value:"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8536");
script_xref(name:"URL", value:"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8537");
script_xref(name:"URL", value:"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8538");
script_xref(name:"URL", value:"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8539");
script_xref(name:"URL", value:"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8540");
script_xref(name:"URL", value:"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8541");
script_xref(name:"URL", value:"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8542");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone AG");
script_family("Windows");
script_dependencies("smb_reg_service_pack.nasl");
script_require_ports(139, 445);
script_mandatory_keys("SMB/WindowsVersion");
exit(0);
}
include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");
if(hotfix_check_sp(win7:2, win7x64:2, win2008:3, win2008x64:3, win2008r2:2,
win8_1:1, win8_1x64:1,win2012:1, win2012R2:1, win10:1,
win10x64:1, win2016:1) <= 0){
exit(0);
}
key = "SOFTWARE\Microsoft\Windows Defender";
if(!registry_key_exists(key:key)){
exit(0);
}
def_version = registry_get_sz(key:"SOFTWARE\Microsoft\Windows Defender\Signature Updates",
item:"EngineVersion");
if(!def_version){
exit(0);
}
##Last version of the Microsoft Malware Protection Engine affected by this vulnerability Version 1.1.13704.0
##First version of the Microsoft Malware Protection Engine with this vulnerability addressed 1.1.13804.0
if(version_is_less(version:def_version, test_version:"1.1.13804.0"))
{
report = 'Installed version : ' + def_version + '\n' +
'Vulnerable range: Less than 1.1.13804.0';
security_message(data:report);
exit(0);
}
exit(0);
www.securityfocus.com/bid/98702
www.securityfocus.com/bid/98703
www.securityfocus.com/bid/98704
www.securityfocus.com/bid/98705
www.securityfocus.com/bid/98706
www.securityfocus.com/bid/98707
www.securityfocus.com/bid/98708
www.securityfocus.com/bid/98710
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8535
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8536
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8537
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8538
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8539
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8540
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8541
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8542
www.cisa.gov/known-exploited-vulnerabilities-catalog
Known Exploited Vulnerability (KEV) catalog
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
High
0.949 High
EPSS
Percentile
99.3%