9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
High
0.147 Low
EPSS
Percentile
95.8%
This host is missing an important security
update according to Microsoft Security Updates released for Microsoft Malware
Protection Engine dated 12/06/2017
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.812238");
script_version("2024-06-28T05:05:33+0000");
script_cve_id("CVE-2017-11937", "CVE-2017-11940");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2024-06-28 05:05:33 +0000 (Fri, 28 Jun 2024)");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2018-10-30 16:27:00 +0000 (Tue, 30 Oct 2018)");
script_tag(name:"creation_date", value:"2017-12-08 11:29:03 +0530 (Fri, 08 Dec 2017)");
script_name("Microsoft Malware Protection Engine on Windows Defender Multiple RCE Vulnerabilities");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone AG");
script_family("Windows");
script_dependencies("smb_reg_service_pack.nasl");
script_require_ports(139, 445);
script_mandatory_keys("SMB/WindowsVersion");
script_xref(name:"URL", value:"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11937");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/102070");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/102104");
script_xref(name:"URL", value:"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11940");
script_tag(name:"summary", value:"This host is missing an important security
update according to Microsoft Security Updates released for Microsoft Malware
Protection Engine dated 12/06/2017");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist when the Microsoft
Malware Protection Engine does not properly scan a specially crafted file,
leading to memory corruption.");
script_tag(name:"impact", value:"Successful exploitation will allow an
attacker who successfully exploited this vulnerability to execute arbitrary
code in the security context of the LocalSystem account and take control of
the system. An attacker could then:
- install programs
- view, change, or delete data
- create new accounts with full user rights.");
script_tag(name:"affected", value:"- Microsoft Windows Defender on Microsoft Windows 8.1
- Microsoft Windows 7 SP1
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2016 x64
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows 10 Version 1703 x32/x64
- Microsoft Windows 10 Version 1709 x32/x64");
script_tag(name:"solution", value:"Run the Windows Update to update the malware
protection engine to the latest version available. Typically, no action is
required as the built-in mechanism for the automatic detection and deployment
of updates will apply the update itself.");
script_tag(name:"qod_type", value:"registry");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
if(hotfix_check_sp(win7:2, win7x64:2, win8_1:1, win8_1x64:1, win10:1, win10x64:1, win2016:1) <= 0)
exit(0);
key = "SOFTWARE\Microsoft\Windows Defender";
if(!registry_key_exists(key:key))
exit(0);
check_key = key + "\Signature Updates";
check_item = "EngineVersion";
def_version = registry_get_sz(key:check_key, item:check_item);
if(!def_version || def_version !~ "^[0-9.]{2,}")
exit(0);
##Last version of the Microsoft Malware Protection Engine affected by this vulnerability Version 1.1.14306.0
##First version of the Microsoft Malware Protection Engine with this vulnerability addressed 1.1.14405.2
if(version_is_less(version:def_version, test_version:"1.1.14405.2")) {
report = report_fixed_ver(installed_version:def_version, fixed_version:"1.1.14405.2", reg_checked:check_key + "!" + check_item);
security_message(port:0, data:report);
exit(0);
}
exit(99);
9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
High
0.147 Low
EPSS
Percentile
95.8%