Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all articles
Browse latest Browse all 12749

【漏洞预警】Microsoft恶意软件防护引擎远程执行代码漏洞(CVE-2017-0290)

$
0
0
【漏洞预警】Microsoft恶意软件防护引擎远程执行代码漏洞(CVE-2017-0290)

2017-05-09 10:32:25

阅读:160次
点赞(0)
收藏




【漏洞预警】Microsoft恶意软件防护引擎远程执行代码漏洞(CVE-2017-0290)

作者:安全客





【漏洞预警】Microsoft恶意软件防护引擎远程执行代码漏洞(CVE-2017-0290)

漏洞编号:CVE-2017-0290

漏洞发现者:Google Project Zero的 Natalie Silvanovich和Tavis Ormandy

漏洞等级:严重

漏洞危害:成功利用此漏洞的攻击者可在LocalSystem账户下执行任意代码,并控制系统。攻击者可以安装程序;查看,更改或删除数据; 以及创建具有完整用户权限的新帐户。

漏洞简述:

A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file leading to memory corruption.

An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, a specially crafted file must be scanned by an affected version of the Microsoft Malware Protection Engine. There are many ways that an attacker could place a specially crafted file in a location that is scanned by the Microsoft Malware Protection Engine. For example, an attacker could use a website to deliver a specially crafted file to the victim's system that is scanned when the website is viewed by the user. An attacker could also deliver a specially crafted file via an email message or in an Instant Messenger message that is scanned when the file is opened. In addition, an attacker could take advantage of websites that accept or host user-provided content, to upload a specially crafted file to a shared location that is scanned by the Malware Protection Engine running on the hosting server.

If the affected antimalware software has real-time protection turned on, the Microsoft Malware Protection Engine will scan files automatically, leading to exploitation of the vulnerability when the specially crafted file scanned. If real-time scanning is not enabled, the attacker would need to wait until a scheduled scan occurs in order for the vulnerability to be exploited. All systems running an affected version of antimalware software are primarily at risk.

The update addresses the vulnerability by correcting the manner in which the Microsoft Malware Protection Engine scans specially crafted files.

Microsoft received information about this vulnerability through coordinated vulnerability disclosure.

Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security advisory was originally issued.


受影响的软件


【漏洞预警】Microsoft恶意软件防护引擎远程执行代码漏洞(CVE-2017-0290)

受此漏洞影响的Microsoft恶意软件保护引擎版本:Version 1.1.13701.0

第一个解决该漏洞的Microsoft恶意软件保护引擎版本:Version 1.1.13704.0


建议操作

检查是否安装更新,对于受影响的软件,请验证Microsoft恶意软件防护引擎版本是否为1.1.10701.0或更高版本。

如果必要的话,请安装更新。企业反恶意软件部署的管理员应确保其更新管理软件被配置为自动更新和部署,该更新会在48小时内生效。有关如何手动更新Microsoft恶意软件防护引擎和恶意软件定义的详细信息,请参阅Microsoft知识库文章2510781


更多漏洞详细细节:

https://bugs.chromium.org/p/project-zero/issues/detail?id=1252&desc=5


参考

https://technet.microsoft.com/en-us/library/security/4022344

https://bugs.chromium.org/p/project-zero/issues/detail?id=1252&desc=5




【漏洞预警】Microsoft恶意软件防护引擎远程执行代码漏洞(CVE-2017-0290)
【漏洞预警】Microsoft恶意软件防护引擎远程执行代码漏洞(CVE-2017-0290)
本文转载自 microsoft.com
原文链接:https://technet.microsoft.com/zh-cn/library/security/4022344

Viewing all articles
Browse latest Browse all 12749

Trending Articles