CVE-2017-8759

Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."
References
Link Resource
http://www.securityfocus.com/bid/100742 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039324 Broken Link Third Party Advisory VDB Entry
https://github.com/GitHubAssessments/CVE_Assessments_01_2020 Third Party Advisory
https://github.com/bhdresh/CVE-2017-8759 Exploit Third Party Advisory
https://github.com/nccgroup/CVE-2017-8759 Exploit Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759 Patch Vendor Advisory
https://www.exploit-db.com/exploits/42711/ Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/100742 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039324 Broken Link Third Party Advisory VDB Entry
https://github.com/GitHubAssessments/CVE_Assessments_01_2020 Third Party Advisory
https://github.com/bhdresh/CVE-2017-8759 Exploit Third Party Advisory
https://github.com/nccgroup/CVE-2017-8759 Exploit Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759 Patch Vendor Advisory
https://www.exploit-db.com/exploits/42711/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
OR cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
OR cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:34

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/100742 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100742 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039324 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039324 - Broken Link, Third Party Advisory, VDB Entry
References () https://github.com/GitHubAssessments/CVE_Assessments_01_2020 - Third Party Advisory () https://github.com/GitHubAssessments/CVE_Assessments_01_2020 - Third Party Advisory
References () https://github.com/bhdresh/CVE-2017-8759 - Exploit, Third Party Advisory () https://github.com/bhdresh/CVE-2017-8759 - Exploit, Third Party Advisory
References () https://github.com/nccgroup/CVE-2017-8759 - Exploit, Third Party Advisory () https://github.com/nccgroup/CVE-2017-8759 - Exploit, Third Party Advisory
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759 - Patch, Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759 - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/42711/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/42711/ - Third Party Advisory, VDB Entry

24 Jul 2024, 17:11

Type Values Removed Values Added
First Time Microsoft windows Rt 8.1
Microsoft windows 7
Microsoft windows Server 2012
Microsoft windows 10 1507
Microsoft windows 10 1511
Microsoft windows 10 1703
Microsoft windows 8.1
Microsoft windows Server 2016
Microsoft windows 10 1607
Microsoft windows Server 2008
CPE cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*
CWE CWE-20 NVD-CWE-noinfo
References () http://www.securityfocus.com/bid/100742 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100742 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039324 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039324 - Broken Link, Third Party Advisory, VDB Entry
References () https://github.com/GitHubAssessments/CVE_Assessments_01_2020 - () https://github.com/GitHubAssessments/CVE_Assessments_01_2020 - Third Party Advisory
References () https://github.com/bhdresh/CVE-2017-8759 - () https://github.com/bhdresh/CVE-2017-8759 - Exploit, Third Party Advisory
References () https://github.com/nccgroup/CVE-2017-8759 - () https://github.com/nccgroup/CVE-2017-8759 - Exploit, Third Party Advisory

Information

Published : 2017-09-13 01:29

Updated : 2024-11-21 03:34


NVD link : CVE-2017-8759

Mitre link : CVE-2017-8759

CVE.ORG link : CVE-2017-8759


JSON object : View

Products Affected

microsoft

  • windows_10_1511
  • windows_10_1703
  • windows_10_1507
  • windows_7
  • .net_framework
  • windows_8.1
  • windows_rt_8.1
  • windows_server_2016
  • windows_10_1607
  • windows_server_2012
  • windows_server_2008