CVE-2018-0986

A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file, leading to memory corruption, aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability." This affects Windows Defender, Windows Intune Endpoint Protection, Microsoft Security Essentials, Microsoft System Center Endpoint Protection, Microsoft Exchange Server, Microsoft System Center, Microsoft Forefront Endpoint Protection.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:exchange_server:2013:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:exchange_server:2016:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:security_essentials:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:microsoft:forefront_endpoint_protection_2010:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:intune_endpoint_protection:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_endpoint_protection:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:r2:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*

History

21 Nov 2024, 03:39

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/103593 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103593 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040631 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040631 - Third Party Advisory, VDB Entry
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0986 - Patch, Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0986 - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/44402/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/44402/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2018-04-04 17:29

Updated : 2024-11-21 03:39


NVD link : CVE-2018-0986

Mitre link : CVE-2018-0986

CVE.ORG link : CVE-2018-0986


JSON object : View

Products Affected

microsoft

  • exchange_server
  • windows_server_2008
  • windows_7
  • windows_8.1
  • windows_rt_8.1
  • security_essentials
  • intune_endpoint_protection
  • windows_server_2016
  • system_center_endpoint_protection
  • windows_defender
  • windows_server_2012
  • windows_10
  • forefront_endpoint_protection_2010
CWE
CWE-787

Out-of-bounds Write